期刊文献+

基于向量空间接入结构的分布式密钥生成 被引量:2

Distributed Key Generation Based on Vector Space Access Structures
下载PDF
导出
摘要  密钥生成是密码系统的一个重要组成部分,其安全性对整个密码系统的安全性起着至关重要的作用.在群体保密通信、电子商务和面向群体的密码学中,往往需要采用分布式的密钥生成方式.本文对基于向量空间接入结构的分布式密钥生成进行了研究.以向量空间接入结构上信息论安全的一个可验证秘密分享方案为基础,提出了适应于这类接入结构的一个安全高效的分布式密钥生成协议.该协议比常见的基于门限接入结构的分布式密钥生成协议具有更广泛的适用性. Key generation plays an important role in a cryptosystem. Its security is significant for the security of the whole cryptosystem. In situations such as group oriented cryptography, group secret communication and electronic commerce, distributed key generation are needed. The problem of distributed key generation based on vector space access structures is studied. On the foundation of an information theoretic secure verifiable secret sharing scheme over vector space access structures, a secure and efficient distributed key generation protocol over this kind of access structures is presented. Compared to the existing distributed key generation protocols based on threshold access structures, the new protocol has a wider range of applications.
作者 张福泰
出处 《电子学报》 EI CAS CSCD 北大核心 2005年第5期816-819,共4页 Acta Electronica Sinica
基金 江苏省高校自然科学研究计划重点项目(No.03KJA520066) 计算机网络与信息安全教育部重点实验室(西安电子科技大学)开放课题 国家"211"工程重点学科建设项目
关键词 密钥生成 分布式密钥生成 群体密码学 可验证秘密分享 向量空间接入结构 Algorithms Communication Electronic commerce Information theory Network protocols Vectors
  • 相关文献

参考文献11

  • 1Pedersen T.A threshold cryptosystem without a trusted party[A].EUROCRYPT'91[C].Berlin:Springer-Verlag,1991.522-626.
  • 2Gennaro R,Jarecki S,Krawczyk H,Rabin T.Secure distributed key generation for discrete-log based cryptosystems[A].EUROCRYPT'99[C].J Stern(Ed.),Berlin:Springer-Verlag,1999.295-310.
  • 3Gennaro R,Jarecki S,Krawczyk H,Rabin T.Robust threshold DSS signatures[J].Information and Computation,2001,164:54-84.
  • 4Shoup V.Practical threshold signaturs[A].EUROCRYPT'2000[C].Berlin:Springer-Verlag,2000.207-220.
  • 5Herzberg A,Jakobsson M,Jarecki S,Krawczyk H,Yung M.Proactive public key and signature systems[A].Proc.of the ACM Conference on Computers and Communication Security[C].New York,ACM Press,1997.100-110.
  • 6Shoup V,Gennaro R.Securing threshold cryptosystems against chosen ciphertext attack[A].EUROCRYPT'98[C].Berlin:Springer-Verlag,1998.1-16.
  • 7Feldman P.A practical scheme for non-interactive verifiable secret sharing[A].Proceedings of 28th IEEE symposium on Foundations of Computer Science[C].New York:IEEE Press,1987.427-437.
  • 8Pedersen T.Non-interactive and information-theoretic secure verifiable secret sharing[A].Advances in Cryptology-Crypto'91[C].Berlin,Springer Verlag,1991.129-140.
  • 9Padró C,Sáez G,Villar J L.Detection of cheaters in vector space secret sharing schemes[J].Designs,Codes and cryptography,1999,16(1):75-85.
  • 10Padró C.Robust vector space secret sharing schemes[J].Information Processing Letters,1998,68:107-111.

同被引文献20

  • 1王彩芬,刘军龙,贾爱库,于成尊.具有前向安全性质的秘密共享方案[J].电子与信息学报,2006,28(9):1714-1716. 被引量:4
  • 2[1]A Shamir.How to share a secret.Communications of the ACM,1979,22(11):612-613
  • 3[2]G R Blakley.Safeguarding cryptographic keys.AFIPS 1979 National Computer Conference,New York,1979
  • 4[3]P Feldman.A practical scheme for non-interactive verifiable secret sharing.In:Proc of the 28th IEEE Symp on Foundations of Computer Science.Los Alamitos,CA:IEEE Computer Society Press,1987.427-438
  • 5[4]T P Pedersen.Non-interactive and information-theoretic secure verifiable secret sharing.In:J Feigenbaum ed.Advances in Cryptology-Crypto'91 Proceedings,LNCS 576.Berlin:Springer-Verlag,1992.129-140
  • 6[5]B Schoenmakers.A simple publicly verifiable secret sharing scheme and its application to electronic voting.In:M Wiener ed.Advances in Cryptology-Crypto'99 Proceedings,LNCS 1666.Berlin:Springer-Verlag,1999.148-164
  • 7[6]M Stadler.Publicly verifiable secret sharing.In:Advances in Cryptology-Proceedings of EUROCRYPT'96,LNCS 1070.Berlin:Springer-Verlag,1996.190-199
  • 8[7]C Padr,G Saez,J L Villar.Detection of cheaters in vector space secret sharing scheme.Designs Code and Cryptography,1999,16(1):75-85
  • 9[8]C Padr.Robust vector space secret sharing schemes.Information Processing Letters,1998,68(3):107-111
  • 10[10]R J Hwang,C C Chang.An on-line secret sharing scheme for multi-secrets.Computer Communications,1998,21(13):1170-1176

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部