「A Hierarchical Secret Sharing Scheme over Finite Fields of Characteristic 2」

2017年度論文賞受賞者の紹介

A Hierarchical Secret Sharing Scheme over Finite Fields of Characteristic 2

[Journal of Information Processing Vol.25, pp.875-883]
[論文概要]

 Hierarchical secret sharing schemes are known for the way the secret is shared among a group of participants that is partitioned into levels. We examine these schemes in terms of how easily they delete a secret after it is distributed or namely for cases where the reliability of data deletion depends on deletion of the indispensable participants' share. In this paper, we consider Tassa's idea of using formal derivatives and Birkhoff interpolation so that his method will work well even over finite fields of characteristic 2, then we devise a method for derivatives. As a result, we propose a fast (k,n) hierarchical secret sharing scheme applicable to any level and report the software implementation evaluation. Moreover, taking practical use into consideration, we cover the optimization specialized for a ({1,3},n) hierarchical secret sharing scheme.

[推薦理由]

 階層的秘密分散法について,標数2の有限体の上で高速に処理可能であり,かつ一般的なアクセス構造において実現可能な階層的秘密分散法を提案している.既存の手法では一般的なアクセス構造における方式は実現できないことを述べ,導関数の使用を避けてもBirkhoff補間が可能であることを示している.Lagrange補間とは異なる補間方法を用い階層的秘密分散法を構成した先行研究の手法が奇標数を仮定していたが,本稿では標数2のケースにも上手く補間できるよう,新規に手法を工夫し提案した.論文中では安全性の根拠を与えるにとどまらず実装評価も行っており、信頼性と実用性が高い優れた研究とみとめられる。これより情報処理学会の論文賞に相応しいと判断し、推薦する.

Koji Shima 君

 He received his B.S. degree in Information Science from Tokyo University of Science in 1997 and M.S. degree in Information Security from Institute of Information Security in 2016, respectively. He joined formerly KOEI Co., Ltd. in 1997. Afterwards, he joined Sony Interactive Entertainment Inc. in 2001. His research interests include information security and network protocols.

Hiroshi Doi 君

 He received his B.S. degree in Mathematics from Okayama University in 1988, M.I.S. degree in Information Science from JAIST in 1994, and D.S. degree from Okayama University in 2000, respectively. He is currently a professor of Graduate School of Information Security, Institute of Information Security. His research interests include information security and cryptography.