Please use this identifier to cite or link to this item:
https://ah.lib.nccu.edu.tw/handle/140.119/68433
DC Field | Value | Language |
---|---|---|
dc.contributor | 資科系 | en_US |
dc.creator | 左瑞麟 | zh_TW |
dc.creator | Tso,Raylin;Miao,Ying;Takeshi Okamoto;Eiji Okamoto | en_US |
dc.date | 2005 | en_US |
dc.date.accessioned | 2014-08-07T06:41:34Z | - |
dc.date.available | 2014-08-07T06:41:34Z | - |
dc.date.issued | 2014-08-07T06:41:34Z | - |
dc.identifier.uri | http://nccur.lib.nccu.edu.tw/handle/140.119/68433 | - |
dc.description.abstract | In the Shamir (t, n)-threshold scheme, the dealer constructs a random polynomial f(x) ∈ GF(p)[x] of degree at most t-1 in which the constant term is the secret K ∈ GF(p). However, if the chosen polynomial f(x) is of degree less than t-1, then a conspiracy of any t-1 participants can reconstruct the secret K;on the other hand, if the degree of f(x) is greater than t-1, then even t participants can not reconstruct the secret K properly. To prevent these from happening, the degree of the polynomial f(x) should be exactly equal to t-1 if the dealer claimed that the threshold of this scheme is t. There also should be some ways for participants to verify whether the threshold is exactly t or not. A few known verifiable threshold schemes provide such ability but the securities of these schemes are based on some cryptographic assumptions. The purpose of this paper is to propose some threshold-verification protocols for the Shamir (t, n)-threshold scheme from the viewpoint of unconditional security. | en_US |
dc.format.extent | 285448 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | en_US | - |
dc.relation | Transactions of Information Processing Society of Japan,46(8),1824-1833 | en_US |
dc.title | How to verify the threshold t of the Shamir’s (t,n)-threshold scheme | en_US |
dc.type | article | en |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.grantfulltext | restricted | - |
item.languageiso639-1 | en_US | - |
item.cerifentitytype | Publications | - |
item.fulltext | With Fulltext | - |
item.openairetype | article | - |
Appears in Collections: | 期刊論文 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
1024-1833.pdf | 278.76 kB | Adobe PDF2 | View/Open |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.