期刊文献+

可用于公开信道的密钥共享方案

Secret Sharing Schemes Applicable for Public Channel
下载PDF
导出
摘要 该文首先指出现有的门限密钥共享方案都不能用于公开信道,然后给出了两个可用于公开信道的密钥共享方案SS-1和SS-2。利用方案SS-1中给出的方法,几乎所有的门限密钥共享方案都可以得到改进,并且不影响原方案所具有的特性。方案SS-2解决了两个敌对团体间共享密钥的问题,其优点是不需要中间人,其安全性主要基于离散对数问题。 Firstly,we show that the previous secret sharing schemes are not applicable for public channel.Next,two secret sharing schemes,SS-1 and SS-2,applicable for public channel are presented.Almost all the secret sharing schemes can be improved by using the method given in SS-1.SS-2 can be used in two opposed delegations and its security is mainly based on the discrete logarithm problem.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第8期16-18,共3页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(编号:60172060)
关键词 密钥共享 公开信道 离散对数 门限体制 secret sharing,public channel,discrete logarithm,threshold scheme
  • 相关文献

参考文献12

  • 1A Shamir. How to share a secret[J].Communications of the ACM,1979 ;22( 11 ) :612-613.
  • 2G R Blakley.Safeguarding cryptographic keys[C].In:Proceedings of AFIPS 1979 National Computer Conference, 1979: 313-317.
  • 3M Tompa,H Woll. How to share a secret with cheaters[J].Journal of Crypto, 1988; 1 (1): 133-138.
  • 4D R Stinson. Decomposition constructions for secret sharing schemes [J].IEEE Trans on Inform Theory,1994;40:118-125.
  • 5A Beimel,B Chor. Secret sharing with public reconstruction[C].In:Advances in Cryptology-Crypto'95,1995: 353-366.
  • 6R Gennaro,S Micali.Verifiable secret sharing as secure computation [C].In:Advances in Cryptology-Crypto'94,Berlin:Springer Verlag,1995:168-182.
  • 7施荣华.一种多重密钥共享认证方案[J].计算机学报,2003,26(5):552-556. 被引量:21
  • 8何明星,范平志,袁丁.一个可验证的门限多秘密分享方案[J].电子学报,2002,30(4):540-543. 被引量:29
  • 9B Schneier. Applied cryptography: protocols, algorithms, and source code in C[M].John Wiley and Sons, 1993.
  • 10W Diffie,M E Hellman. New direction in cryptography[J].IEEE Transactions on Information Theory, 1976;22(2) :644-654.

二级参考文献6

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部