期刊文献+

基于因式分解的防止欺诈的多秘密分享方案 被引量:4

A Cheat-proof Multi-secret Sharing Scheme Based on Factorization
下载PDF
导出
摘要 针对现有的多秘密分享方案不能同时有效解决分发者和分享者欺诈,以及子秘密恢复时计算量大等问题,在基于求解大整数因式分解的难题上,提出了一种有效的解决方案。该方案不仅有效地解决了分发者和分享者欺诈问题,而且每个分享者只需拥有一个秘密份额就能和其它分享者分享多个秘密信息。与其它已有的方案相比,方案的优点在于计算量低和子秘密恢复时采用了并行算法。 Most previous multi-secret sharing schemes have some problems in that those schemes cannot deter the cheating of both the dealer and shadowholders efficiently and the computation of a secret recovery is overhead. An efficient solving scheme based on the difficulty of computing the large-integer factorization problem has been proposed. This new scheme not only solves the fraud efficiently of both the dealer and any participants but also helps each participant to share multiple secrets with other participants by holding only one shadow. Compared with other schemes, the proposed scheme has the advantages of lower computation and parallel reconstruction in a secret recovery phase.
作者 甘元驹 曹刚
出处 《铁道学报》 EI CAS CSCD 北大核心 2004年第4期79-81,共3页 Journal of the China Railway Society
关键词 密码学 多秘密分享 因式分解问题 欺骗 Cryptography multi-secret sharing factorization problem cheating
  • 相关文献

参考文献5

  • 1Chien H Y, Jan J K. A Practical (t,n) multi-secret sharing scheme[J]. IEICE Trans. , 2000, E83(12) :2762-2765.
  • 2Hwang R, Chang C. An on-line secret sharing scheme for multi-secrets[J]. Computer communications, 1998,21 (13) :1170-1176.
  • 3Sun H. On-line multiple secret sharing based on a one-way function [ J ]. Computer communications, 1999, 22 ( 8 ) :745-748.
  • 4Harn L. Efficient sharing (broadcasting) of multiple secrets[J]. IEE Proc., Comput. Dig. Tech., 1995, 142.(3) :237-240.
  • 5甘元驹,黎群辉.基于因式分解的可证实的门限群签名方案[J].铁道学报,2003,25(3):69-72. 被引量:6

二级参考文献8

  • 1Desmedt Y, Frankel Y. Shared generation of authenticators and signatures[A]. In:Feigenbaum J ed. Advances in Cryptology-Crypto'91 Proceedings[C]. Berlin: Springer Verlag, 1992. 457.
  • 2Li C, Hwang T, Lee N. Remark on the threshold RSA signature scheme[A]. In: Stinson D Red. Advances in Cryptology-Crypto' 93 Proceedings[C]. Berlin: Springer-Verlag, 1994. 413.
  • 3Li C, Hwang T, Lee N. Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders[A].In: Santis A D ed. Advances in Cryptology-Eurocrypt' 94 Proceedings[C]. Berlin:Springer-Verlag, 1995. 194.
  • 4Michels M, Horster P. On the risk of disruption in several multiparty signature schemes [A]. In: Feigenbaum J ed.Advances in Cryptology- Crypto'96 Proceedings[C]. Berlin:Springer-Verlag, 1997. 334.
  • 5Harn L. Group-oriented (t, n) threshold digital signature scheme and multisignature[J]. IEE Proceedings, Computers and Digital Techniques, 1994, 141(5):307.
  • 6Guillou L C , Quisquater J J. A paradoxical identity-based signature scheme resulting from zero-knowledge[A]. In:Feigenbaum J ed. Advances in Cryptology-Crypto' 88 Proceedings[C]. Berlin:Springer-Verlag, 1990. 216.
  • 7徐秋亮.改进门限RSA数字签名体制[J].计算机学报,2000,23(5):449-453. 被引量:63
  • 8王贵林,卿斯汉.几个门限群签名方案的弱点[J].软件学报,2000,11(10):1326-1332. 被引量:61

共引文献5

同被引文献21

  • 1甘元驹,彭银桥,谢仕义,郑小平.改进的公开验证认证加密方案[J].四川大学学报(工程科学版),2005,37(3):115-117. 被引量:4
  • 2谢琪,于秀源,王继林.一种安全有效的(t,n)多秘密共享认证方案[J].电子与信息学报,2005,27(9):1476-1478. 被引量:8
  • 3甘元驹,谢仕义,付东洋.防欺诈的动态(t,n)门限多秘密共享方案[J].四川大学学报(工程科学版),2006,38(6):131-134. 被引量:7
  • 4何斌,黄杰,黄根勋,唐燕.一种分布式可验证的多秘密共享方案[J].微计算机信息,2006,22(12X):61-62. 被引量:2
  • 5Tompa M, Woll H. How to share a secret with cheaters [J]. J Cryptol, 1988, 1(01):133-138.
  • 6Harn L. Efficient sharing (broadcasting) of multiple secret [J]. IEE Proc. Comput. Digit Tech. 1995, 143(03):237-240.
  • 7[1]Tompa M,Woll H.How to share a secret with cheaters[J].J Cryptol,1988,1(1):133-138.
  • 8[3]Harn L.Efficient sharing (broadcasting) of multiple secret[J].IEE Proc Comput Digit Tech,1995,143(3):237-240.
  • 9[4]Lin T Y,Wu T C.(t,n) threshold verifiable multisecret sharing scheme based on factorization intractability and discrete logarithm modulo a composite problems[J].IEE Proc ComputDigit Tech,1999,146(5):264-268.
  • 10[5]Chang T Y,Hwang M S,Yang W P.An improvement on the Lin wu (t,n) threshold verifiable multisecret sharing scheme[J].Applied Mathematics and Computation,2005,163(1):169-178.

引证文献4

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部