期刊文献+

基于二次剩余的安全矢量空间秘密共享方案 被引量:2

Secret sharing scheme of secure vector space based on quadratic residue
下载PDF
导出
摘要 为了拓展门限结构的秘密共享体制,提出了一个更为广泛的防欺诈的矢量空间秘密共享方案.以防欺诈的门限方案作为雏形,对所共享的秘密进行封装,公开其承诺量,在分发者分发秘密份额时检测共享秘密的正确性,从而防止了恶意分发者散发虚假的份额.利用计算二次剩余的困难性,在恢复秘密时验证各参与者提供份额的有效性,同时杜绝了恶意参与者欺诈的可能性.与同类方案相比,该方案不仅具有最优的信息率,而且花费很小的计算和通信代价. A vector space secret sharing scheme against cheating was proposed for extending the normal threshold structure. In this scheme, the secret was encapsulated, and its commitment was publicized. Then everyone can verify the correctness of the distribution of secret shares, and any malicious dealer can be detected efficiently. In the process of secret recovery, each shareholder who pooled share was authenticated by means of the intractability of quadratic residue over finite field of large prime order, which prevented the adversaries from getting the secret or shares and the shareholders from cheating each other. Thus any unfaithful shareholders was traced and determined. Compared with the similar schemes, the proposed scheme not only has maximum information rate, but also has far lower computation and communication cost.
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2004年第11期1408-1411,1421,共5页 Journal of Zhejiang University:Engineering Science
基金 浙江省自然科学基金资助项目(001101352).
关键词 秘密共享 欺诈 二次剩余 信息率 Algorithms Computational complexity Information management Theorem proving
  • 相关文献

参考文献9

  • 1SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612 - 613.
  • 2BLAKLEY G R. Safeguarding cryptographic keys [A].Proceeding of AFIPS 1979 National Computer Conference[C]. Reston: American Federation of Information Processing Societies, 1979:313 - 317.
  • 3BRICKELL E F. Some ideal secret sharing schemes[J]. Journal of Combinatorial Mathematics and Combinatorial Computing, 1989, 6: 105- 113.
  • 4PADRo C, SaEZ G. Detection of cheaters in vector space secret sharing schemes [J]. Designs, Codes and Cryptography, 1999, 16(1): 75- 85.
  • 5许春香,傅小彤,肖国镇.预防欺诈的矢量空间秘密共享方案[J].西安电子科技大学学报,2002,29(4):527-529. 被引量:13
  • 6BEIMEL A, CHOR B. Universally ideal secret-sharing schemes [J]. IEEE Transactions on Information Theory, 1994, 40(3): 786 - 794.
  • 7PADRo C, SaEZ G. Secret sharing schemes with bipartite access structure [J]. IEEE Transactions on Information Theory, 2000, 46(7): 2596- 2604.
  • 8潘承洞 潘承彪.初等数论[M].北京:北京大学出版社,1991..
  • 9STINSON D R. Cryptography: Theory and Practice [M]. New York: CRC Press, 1995: 343-350.

二级参考文献4

共引文献21

同被引文献24

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部