Kil-Ho Shin
Fuji Xerox
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kil-Ho Shin.
workshops on enabling technologies infrastracture for collaborative enterprises | 1999
Kil-Ho Shin; Masaki Kyojima
This paper presents a practical method which enables an owner of a private key to entrust the use of the key to an entrustee without exposing the actual key. The following are features of the method: it covers a wide variety of existing public-key cryptographic algorithms; it provides the owner of the private key with a means of preventing the entrustee from abusing the entrusted key beyond the limits which the key owner arbitrarily specifies; it only adds a very small, usually negligible, amount of overhead to calculations required in the base public-key cryptographic algorithm. An outline of our method is as follows. An owner of a private key issues to an entrustee data called a ticket through the cooperation of a trusted third party. With the ticket, the entrustee can execute calculations, which yield the same results as those using the actual private key do.
Archive | 1997
Kil-Ho Shin; Kenichi Kobayashi; Toru Aratani
Archive | 1998
Kenichiro Kigo; Masaki Kyojima; Shunichi Kojima; Kil-Ho Shin
Archive | 1998
Shoichi Hayashi; Toru Aratani; Kil-Ho Shin
Archive | 2000
Masaki Kyojima; Kil-Ho Shin
Archive | 1996
Kil-Ho Shin; Kenichi Kobayashi; Toru Aratani
Archive | 2000
Masaki Kyojima; Kil-Ho Shin
Archive | 1994
Kil-Ho Shin; Akira Suzuki
Archive | 1997
Kazuo Saito; Kil-Ho Shin; Koji Takeda
Archive | 1995
Kil-Ho Shin; Kenichi Kobayashi; Akira Suzuki