Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/68433
DC FieldValueLanguage
dc.contributor資科系en_US
dc.creator左瑞麟zh_TW
dc.creatorTso,Raylin;Miao,Ying;Takeshi Okamoto;Eiji Okamotoen_US
dc.date2005en_US
dc.date.accessioned2014-08-07T06:41:34Z-
dc.date.available2014-08-07T06:41:34Z-
dc.date.issued2014-08-07T06:41:34Z-
dc.identifier.urihttp://nccur.lib.nccu.edu.tw/handle/140.119/68433-
dc.description.abstractIn the Shamir (t, n)-threshold scheme, the dealer constructs a random polynomial f(x) ∈ GF(p)[x] of degree at most t-1 in which the constant term is the secret K ∈ GF(p). However, if the chosen polynomial f(x) is of degree less than t-1, then a conspiracy of any t-1 participants can reconstruct the secret K;on the other hand, if the degree of f(x) is greater than t-1, then even t participants can not reconstruct the secret K properly. To prevent these from happening, the degree of the polynomial f(x) should be exactly equal to t-1 if the dealer claimed that the threshold of this scheme is t. There also should be some ways for participants to verify whether the threshold is exactly t or not. A few known verifiable threshold schemes provide such ability but the securities of these schemes are based on some cryptographic assumptions. The purpose of this paper is to propose some threshold-verification protocols for the Shamir (t, n)-threshold scheme from the viewpoint of unconditional security.en_US
dc.format.extent285448 bytes-
dc.format.mimetypeapplication/pdf-
dc.language.isoen_US-
dc.relationTransactions of Information Processing Society of Japan,46(8),1824-1833en_US
dc.titleHow to verify the threshold t of the Shamir’s (t,n)-threshold schemeen_US
dc.typearticleen
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.grantfulltextrestricted-
item.languageiso639-1en_US-
item.cerifentitytypePublications-
item.fulltextWith Fulltext-
item.openairetypearticle-
Appears in Collections:期刊論文
Files in This Item:
File Description SizeFormat
1024-1833.pdf278.76 kBAdobe PDF2View/Open
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.