期刊文献+

理性多秘密分享

Rational Multi-secret Sharing
下载PDF
导出
摘要 主要研究已有的理性秘密共享方案中存在的参与者欺骗问题,在以往的理性秘密分享方案中,理性参与者为了最大化自己的利益选择发送自己的子秘密,如果存在参与者发送错误的子秘密则共享秘密不能被重构,这对其他诚实的参与者来说是不公平的;针对此问题,提出将欺骗者从参与重构的集合中排除的解决方案,以保证对其他诚实的参与者的公平性,在方案中使用承诺值来验证本轮是否为有意义轮,利用单向函数来验证参与者发送的子秘密的正确性.结合多秘密分享,提出了一个对诚实的参与者公平的理性多秘密分享方案. In this paper, we mainly focused on the cheating problem in the existed rational secret sharing schemes. In the past the in- teracting times is uncertainty in the scheme which has random interaction times, rational players send their secret share since they want to maximize their own interests. However, if there are players who deceive secret share then others can not reconstructed secret, this is not fair to the other honest players. To solve this problem, this paper give a solution to protect the fairness for honest players, the solution is that when cheaters are discovered they will be excluded from the player collection who will reconstruct the secret. This pa- per uses the commitment value to verify whether this run is meanness, and verify the correctness of secret share by one-way hash function. Then combined with the property of the multi-secret sharing, we give a rational multi-secret sharing scheme.
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第6期1392-1395,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60842002 61272542 61103183 61103184)资助 中国博士后基金项目(20100471373)资助 中央高校基本科研业务费专项资金项目(2009B21114 2010B07114)资助 江苏省"六大人才高峰"项目(2009182)资助 河海大学新世纪优秀人才计划项目资助
关键词 秘密共享 理性参与者 博弈论 多秘密分享 secret sharing rational player game theory multi-secret sharing
  • 相关文献

参考文献2

二级参考文献9

  • 1A Shamir.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2H.-Y.Lin,Harn L.A generalized secret sharing scheme with cheater detection[A].Advances in Cryptology-ASIACRYPT'91 Proceedings[C],Berlin:Springer-Verlag,1993.149-158.
  • 3M Carpentieri.A perfect threshold secret sharing scheme to identify cheaters[J].Designs,Codes and Cryptography,1995,5(3):183-197.
  • 4J Rifa-Coma.How to avoid the cheaters succeeding in the key sharing scheme[J].Designs,Codes and cryptography,1993,3(3):221-228.
  • 5E F Brickell,D R Stinson.The detection of cheaters in threshold scheme[A].Advances in Cryptology-CRYPTO'88[C],Berlin:Springer-Verlag,1988.564-577.
  • 6L Harn,H Lin.An l-span generalized secret sharing scheme[A].Advances in Cryptology-CRYPTO'92[C].Berlin:Springer-Verlag,1992.558-565.
  • 7L Harn.Efficient sharing (Broadcasting) of multiple secrets,IEE Proc.-Comput.Digit.Tech.1995,142(3):237-240.
  • 8L Chen,D Gollmann,C J Mitchell,P Wild.Secret sharing with reusable polynomials[A].The Second Australasian Conference on Information Security and Privacy-ACISP'97[C].Berlin:Springer-Verlag,1997.183-192.
  • 9GENNARO R.,JARECKI S.,KRAWCZYK H.et al.Robust and efficient sharing of RSA functions[A].Advanced in Cryptology-- CRYPTO'96 Proceedings[C].Berlin:Springer Verlag,1996.157-172.

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部