TY - GEN
T1 - Password-protected secret-sharing schemes without random oracles
AU - Hasegawa, Shingo
AU - Isobe, Shuji
AU - Iwazaki, Jun Ya
AU - Koizumi, Eisuke
AU - Shizuya, Hiroki
N1 - Publisher Copyright:
© 2014 IEICE.
PY - 2014/12/8
Y1 - 2014/12/8
N2 - We propose a password-protected secret sharing scheme which is provably secure without the random oracles. Three tools enable us to achieve this property: the IND-CCA secure threshold encryption scheme of Libert and Yung, the linear encryption scheme and the technique for constructing a simulation-sound non-interactive zero knowledge proof for any language in NP.
AB - We propose a password-protected secret sharing scheme which is provably secure without the random oracles. Three tools enable us to achieve this property: the IND-CCA secure threshold encryption scheme of Libert and Yung, the linear encryption scheme and the technique for constructing a simulation-sound non-interactive zero knowledge proof for any language in NP.
KW - decision linear problem
KW - password-protected secret sharing
KW - simulation-sound non-interactive zero knowledge proof
KW - standard model
KW - subgroup decision problem
UR - http://www.scopus.com/inward/record.url?scp=84920543030&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84920543030&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84920543030
T3 - Proceedings of 2014 International Symposium on Information Theory and Its Applications, ISITA 2014
SP - 566
EP - 570
BT - Proceedings of 2014 International Symposium on Information Theory and Its Applications, ISITA 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2014 International Symposium on Information Theory and Its Applications, ISITA 2014
Y2 - 26 October 2014 through 29 October 2014
ER -