一个实用的门限方案成员加入协议
被引量:1
A Practical Member Enrollment Protocol for Threshold Schemes
摘要
提出了一个实用的门限方案成员加入协议.当门限系统中加入新成员时,协议可以为新成员产生新份额,同时旧的成员不需要改变他们自己的旧份额.与以前的协议不同的是,所提协议非常简单、高效.最后,证明了协议的正确性和安全性.
出处
《北京邮电大学学报》
EI
CAS
CSCD
北大核心
2006年第z2期1-3,18,共4页
Journal of Beijing University of Posts and Telecommunications
基金
国家"863计划"项目(2003AA141120,2004AA001260)
参考文献8
-
1[1]Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
-
2[2]Shoup V.Practical threshold signature[C] //Preneel B.Advance in Cryptology-Eurocrypt 2000 Proceedings.Berlin:Springer -Verlag,2000:207-220.
-
3[3]Desmedt Y,Jajodia S.Redistributing secret shares to new access structures and its application[R].Virginia:George Mason University,ISSE TR-97-01,1997.
-
4[4]Wong T M,Wang C X,Wing J M.Verifiable secret redistribution for archive systems[C] //Proc of the 1st International IEEE Security in Storage Workshop.New York:IEEE Press,2002:94-106.
-
5于佳,孔凡玉,李大兴.Verifiable Secret Redistribution for Proactive Secret Sharing Schemes[J].Journal of Shanghai Jiaotong university(Science),2006,11(2):236-241. 被引量:4
-
6董攀,况晓辉,卢锡城.一种秘密共享新个体加入协议(英文)[J].软件学报,2005,16(1):116-120. 被引量:16
-
7[8]Li Xiao,He Mingxing.A protocol of member-join in a secret sharing scheme[C] // Chen K F.Proc of the 2thInformation Security Practice and Experience.Berlin:Springer-Verlag,2006:134-141.
-
8[9]Pedersen T P.Non-interactive and information-theoretic secure verifiable secret sharing[C] // Feigenbaum J.Advances in Cryptology-Crypto'91 Proceedings.Berlin:Springer-Verlag,1991:129-140.
二级参考文献12
-
1Desmedt Y. Some recent research aspects of threshold cryptography. Irr Okamoto R, Davida G, Mambo M, eds. Information Security. LNCS 1396. Berlin: Springer-Verlag, 1997. 158-173.
-
2Luo H, Lu S. Ubiquitous and robust authentication services for Ad Hoc wireless networks. Technical Report, TR-200030,Department of Computer Science, UCLA, 2000.
-
3Wong TM, Wang CX, Wing JM. Verifiable secret redistribution for archive systems. In: Proc of the 1st Int'l Security in Storage Workshop. 2002.
-
4Shamir S. How to share a secret Communications of the ACM, 1979,22(11 ):612-613.
-
5Pedersen TP. A threshold cryptosystem without a trusted party. In:Proc of the Eurocrpt 1991. LNCS 547. Berlin: Springer-Verlag,1991. 522-526.
-
6Takaragi K, Miyazaki K. A threshold digital signature issuing scheme without secret communication. In: Proc of the IEEE Conf. 1998.
-
7EIGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans on IT, 1985,31(4):469-472.
-
8Desmedt Y. Some recent research aspects of threshold cryptography. In: Okamoto R, Davida G, Mambo M, eds. Information Security. LNCS 1396. Berlin: Springer-Verlag, 1997. 158-173.
-
9Wong TM, Wang CX, Wing JM. Verifiable secret redistribution for archive systems. In: Proc of the 1st Int'l Security in Storage Workshop. 2002.
-
10Pedersen TP. A threshold cryptosystem without a trusted party. In:Proc. of the Eurocrpt 1991. LNCS 547. Berlin: Springer-Verlag,1991. 522-526.
共引文献18
-
1郭渊博,马建峰.容忍入侵的国内外研究现状及所存在的问题分析[J].信息安全与通信保密,2005(7):337-341. 被引量:16
-
2李慧贤,程春田,庞辽军.一个可验证的秘密共享新个体加入协议[J].西安交通大学学报,2006,40(2):207-210. 被引量:5
-
3金永明,徐秋亮.对一种秘密共享新个体加入协议的密码分析[J].计算机工程与应用,2006,42(21):90-91. 被引量:2
-
4胡坤华,李俊.移动自组网络分布式组密钥管理方案[J].计算机应用研究,2007,24(4):136-138.
-
5李俊,崔国华,郑明辉.移动自组网络安全分布式组密钥管理方案[J].小型微型计算机系统,2007,28(6):991-997. 被引量:6
-
6王锋,张建中.一种新的可验证的秘密共享新个体加入协议[J].计算机工程与应用,2007,43(28):122-124. 被引量:4
-
7任勇军,王建东,庄毅,方黎明.基于双线性对的秘密重分配方案[J].兰州大学学报(自然科学版),2008,44(1):82-85. 被引量:2
-
8郝蓉,宋智玲,李绪亮.一个可验证秘密共享新个体加入协议的安全性分析[J].西安交通大学学报,2008,42(8):1059-1060. 被引量:1
-
9许春根,杨彦炯.一种有成员加入的公开可验证秘密共享方案[J].南京理工大学学报,2009,33(2):161-164. 被引量:2
-
10郑明辉,崔国华.基于门限的分布式会议密钥管理方案[J].武汉理工大学学报,2009,31(18):12-15.
同被引文献9
-
1董攀,况晓辉,卢锡城.一种秘密共享新个体加入协议(英文)[J].软件学报,2005,16(1):116-120. 被引量:16
-
2李慧贤,程春田,庞辽军.一个可验证的秘密共享新个体加入协议[J].西安交通大学学报,2006,40(2):207-210. 被引量:5
-
3Chor B, Goldwasser S, Micali S, et al. Verifiable secret sharing and achieving simultaneity in the presence of faults[ A]. Proceedings of 26 IEEE Symposium on Foundations of Computer Science [ C ]. Washington: IEEE Computer Society, 1985. 383 -395.
-
4Stadler M. Publicly verifiable secret sharing[ A]. Advances in Cryptology-EURO-CRYPT'96 [ C ]. Berlin: Springer-Verlag, 1996. 190 - 199.
-
5Fujisaki E, Okamoto T. A practical and provably secure scheme for publicly verifiable secret sharing and its application [ A]. EUROCRYPT'98 [ C ]. Berlin: Springer-Verlag, 1996. 32 -46.
-
6Schoenmakers B. A simple publicly verifiable secret sharing scheme and its application to electronic voting [ A ]. Proceeding of Advances in Cryptology-Crypto'99 [ C]. Berlin: Springer-Verlag, 1999. 148 - 164.
-
7Yu Jia, Kong Fanyu, Hao Rong. Publicly verifiable secret sharing with enrollment ability [ A ]. Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing 2007, Eighth ACIS International Conference [ C ]. Qingdao, China: IEEE Computer Society, 2007. 194 - 199.
-
8Shamir A. How to share a secret[ J]. Communications of the ACM, 1979, 22(11) : 612-613.
-
9Blakley G R. Safeguaring cryptographic keys [ A ]. Proceeding of AFIPS National Computer Conference [C]. New York: AFIPS Press, 1979. 313 -317.
-
1吴宝江,钱莉,许金钢.基于嵌入式系统的协议转换器[J].职业圈,2007(08X):171-172.
-
2郝蓉,宋智玲,李绪亮.一个可验证秘密共享新个体加入协议的安全性分析[J].西安交通大学学报,2008,42(8):1059-1060. 被引量:1
-
3毕越,侯整风.一个基于向量空间秘密共享的新成员加入协议[J].计算机工程与应用,2011,47(16):74-76. 被引量:1
-
4于佳,李大兴,范玉玲.基于加法共享的可验证秘密再分发协议[J].计算机研究与发展,2006,43(1):23-27. 被引量:6
-
5曹嘉莉,高崇志.MV群签密方案的安全性分析[J].广东工业大学学报,2007,24(1):26-28. 被引量:2
-
6金永明,徐秋亮.对一种秘密共享新个体加入协议的密码分析[J].计算机工程与应用,2006,42(21):90-91. 被引量:2
-
7陶杰,吴小红,顾永跟,张伟.I-WSLA:基于WSLA的云计算IaaS协商协议[J].计算机应用与软件,2013,30(2):82-85. 被引量:1
-
8张雪征,李虓,罗大文,黄小林.一个新的秘密共享新个体加入协议[J].西华大学学报(自然科学版),2010,29(3):76-80.
-
9贸.我国首批七家EPCglobalChina系统成员产生[J].信息与电脑,2005,17(11):6-6.
-
10李慧贤,程春田,庞辽军.一个可验证的秘密共享新个体加入协议[J].西安交通大学学报,2006,40(2):207-210. 被引量:5