期刊文献+

On the new member’s subsecret distribution protocol in dynamic group secret-sharing

On the new member’s subsecret distribution protocol in dynamic group secret-sharing
下载PDF
导出
摘要 Secret-sharing is a common method to protect important data, such as the private key of a public-key system. Dynamic Group Secret-sharing (DGS) is a system where all of the members in a group hold a subsecret of the key information and where the number of members in the group is variable. This kind of secret-sharing is broadly used in many special distribution systems, such as Self-secure Ad-hoc Network. Distributing this subsecret to a new member when he enters the group is the common method that ensures all the members participate in the same secret-sharing. However, no’atisfactory subsecret distribution scheme exists at present. This paper proposes a new protocol that tries to satisfy both security and efficiency. Secret-sharing is a common method to protect important data, such as the private key of a public-key system. Dynamic Group Secret-sharing (DGS) is a system where all of the members in a group hold a subsecret of the key information and where the number of members in the group is variable. This kind of secret-sharing is broadly used in many special distribution systems, such as Self-secure Ad-hoc Network. Distributing this subsecret to a new member when he enters the group is the common method that ensures all the members participate in the same secret-sharing. However, no’atisfactory subsecret distribution scheme exists at present. This paper proposes a new protocol that tries to satisfy both security and efficiency.
作者 李承 汪为农
出处 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第2期221-224,共4页 哈尔滨工业大学学报(英文版)
关键词 secret-sharing distribution system dynamic group 秘密分配 分布系统 动态组合 因特网 安全技术 数据安全
  • 相关文献

参考文献7

  • 1Shamir A.How to share a secret[].Communications of the ACM.1979
  • 2CATALANO D,GENNARO R.New efficient and secure protocols for verifiable signature sharing and other applications[].Journal of Computer and System Sciences.2000
  • 3YEAGER W,WILLIAMS J.Secure peer-to-peer networking: the JXTA example[].IT Professional Magazine.2002
  • 4BONEHD,FRANKLINM.EfficientgenerationofsharedRSAkeys[].ProceedingsofCrypto’’.1997
  • 5KONGJJ,ZERFOSP,LUOHY, etal.Providingro bustandubiquitoussecuritysupportformobilead-hocnetworks[].NetworkProtocolsNinthInternationalCon ferenceonICNP.2001
  • 6CAPKUNS,BUTTYANL,HUBAUXJP.Self organizedpublic keymanagementinadhocwirelessnetworks[].ACMWorkshoponWirelessSecurity(WiSe).2002
  • 7BOWENS,MAURERF.Designingadistributedsoft waredevelopmentsupportsystemusingapeer to peerar chitecture[].ProcofthAnnualInterConfComputerSoftwareandApplications.2002

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部