Cryptographic key sharing methods for multi-groups are proposed with threshold access schemes, and the methods are analyzed for safety and reliability, the measures of security. The threshold access scheme is extended from the members in a single group to members in multi-groups of equal or hierarchical status. In the horizontal scheme, agreement between a certain number of groups makes the secret key accessible. In the vertical scheme, agreement of a high level group or agreement between two groups at high and low level makes the secret key accessible. To realize these access schemes, mutually relative polynomials are proposed and the distributed keys are generated and synthesized by interpolation. The equipment and configuration to manage these methods are also explained. The system miss-access and inaccessibility rates of each scheme are formulated, and the characteristics of these schemes are evaluated by numerical examination. It is confirmed that sharing methods for multi-groups have greater safety than for single group.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Kenji KOYAMA, "Cryptographic Key Sharing Methods for Multi-Groups and Security Analysis" in IEICE TRANSACTIONS on transactions,
vol. E66-E, no. 1, pp. 13-20, January 1983, doi: .
Abstract: Cryptographic key sharing methods for multi-groups are proposed with threshold access schemes, and the methods are analyzed for safety and reliability, the measures of security. The threshold access scheme is extended from the members in a single group to members in multi-groups of equal or hierarchical status. In the horizontal scheme, agreement between a certain number of groups makes the secret key accessible. In the vertical scheme, agreement of a high level group or agreement between two groups at high and low level makes the secret key accessible. To realize these access schemes, mutually relative polynomials are proposed and the distributed keys are generated and synthesized by interpolation. The equipment and configuration to manage these methods are also explained. The system miss-access and inaccessibility rates of each scheme are formulated, and the characteristics of these schemes are evaluated by numerical examination. It is confirmed that sharing methods for multi-groups have greater safety than for single group.
URL: https://globals.ieice.org/en_transactions/transactions/10.1587/e66-e_1_13/_p
Copy
@ARTICLE{e66-e_1_13,
author={Kenji KOYAMA, },
journal={IEICE TRANSACTIONS on transactions},
title={Cryptographic Key Sharing Methods for Multi-Groups and Security Analysis},
year={1983},
volume={E66-E},
number={1},
pages={13-20},
abstract={Cryptographic key sharing methods for multi-groups are proposed with threshold access schemes, and the methods are analyzed for safety and reliability, the measures of security. The threshold access scheme is extended from the members in a single group to members in multi-groups of equal or hierarchical status. In the horizontal scheme, agreement between a certain number of groups makes the secret key accessible. In the vertical scheme, agreement of a high level group or agreement between two groups at high and low level makes the secret key accessible. To realize these access schemes, mutually relative polynomials are proposed and the distributed keys are generated and synthesized by interpolation. The equipment and configuration to manage these methods are also explained. The system miss-access and inaccessibility rates of each scheme are formulated, and the characteristics of these schemes are evaluated by numerical examination. It is confirmed that sharing methods for multi-groups have greater safety than for single group.},
keywords={},
doi={},
ISSN={},
month={January},}
Copy
TY - JOUR
TI - Cryptographic Key Sharing Methods for Multi-Groups and Security Analysis
T2 - IEICE TRANSACTIONS on transactions
SP - 13
EP - 20
AU - Kenji KOYAMA
PY - 1983
DO -
JO - IEICE TRANSACTIONS on transactions
SN -
VL - E66-E
IS - 1
JA - IEICE TRANSACTIONS on transactions
Y1 - January 1983
AB - Cryptographic key sharing methods for multi-groups are proposed with threshold access schemes, and the methods are analyzed for safety and reliability, the measures of security. The threshold access scheme is extended from the members in a single group to members in multi-groups of equal or hierarchical status. In the horizontal scheme, agreement between a certain number of groups makes the secret key accessible. In the vertical scheme, agreement of a high level group or agreement between two groups at high and low level makes the secret key accessible. To realize these access schemes, mutually relative polynomials are proposed and the distributed keys are generated and synthesized by interpolation. The equipment and configuration to manage these methods are also explained. The system miss-access and inaccessibility rates of each scheme are formulated, and the characteristics of these schemes are evaluated by numerical examination. It is confirmed that sharing methods for multi-groups have greater safety than for single group.
ER -