期刊文献+

安全分布式乘积产生方案

Secure distributed generation of the product of shared secrets
下载PDF
导出
摘要 提出了一种解决以下问题的新的方案:给定两个由全体群组成员共享的秘密,如何计算出其乘积但不泄漏除乘积以外任何其他秘密信息.该方案在无错情形时是一个两轮协议,其特点是运用了非交互的分布多乘法计算协议和W elch-Berlekamp解码算法,避免了使用零知识证明协议,从而更为有效.同时,通过构造了同模拟机协议给出了方案的安全性证明,达到了可证明安全. A new protocol for the task that give two secrets O, 1 shared among 3 players, compute the product 0 1 but without any exposure about the secrets except the product is presented. It is a two-round protocol if new error occurs. The protocol uses the non-interactive distributed approach for multiplication of the shared secrets and the Welch-Berlekamp decoder for product reconstruction, which results in a more efficient protocol. To achieve provable security, the simulator protocol is given in the security proof.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2006年第1期156-159,共4页 Journal of Xidian University
基金 国家自然科学基金资助项目(60403005) 国家基础研究计划资助项目(G1999035802)
关键词 安全多方计算 分布式密码学 可验证秘密共享 可证明安全 鲁棒性 secure multiparty computation distributed cryptography veriable secret sharing provable security robustness
  • 相关文献

参考文献3

二级参考文献13

  • 1[1]Desmedt, Y.G., Frankel, Y. Threshold cryptosystems. In: Brassard, G., ed. Advances in Cryptology-CRYPTO'89. Volume 435 of LNCS, Berlin: Springer-Verlag, 1990. 307~315.
  • 2[2]Gennaro, R., Rabin, M., Rabin, T. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In: Proceedings of the 17th ACM Symposium on Principles of Distributed Computing. New York: ACM Press, 1998. 101~111.
  • 3[3]Masayuki, Abe. Robust distributed multiplication without interaction. In: Wiener, M., ed. Advances in Cryptology-CRYPTO'99. Volume 1666 of LNCS, Berlin: Springer-Verlag, 2000. 130~147.
  • 4[4]Pedersen, T.P. Non-Interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J., ed. Advances in Cryptology-CRYPTO'91. Volume 576 of LNCS, Berlin: Springer-Verlag, 1992. 129~140.
  • 5[5]Frankel, Y., Yung, M. Adaptively-Secure distributed public key systems. In: Proceedings of the ESA'99. Volume 1643 of LNCS, Berlin: Springer-Verlag, 1999. 4~27.
  • 6[6]Herzberg, A., Jarecki, S., H., et al. Proactive secret sharing or: how to cope with perpetual leakage. In: Coppersmith, D., ed. Advances in Cryptology-CRYPTO'95. Volume 963 of LNCS, Berlin: Springer-Verlag, 1995. 339~352.
  • 7Desmedt Y G.Threshold Cryptography[].European Transaction on Telecommunications.1994
  • 8Masayuki Abe.Robust Distributed Multiplication without Interaction[].In M Wiener Editor Advances in Cryptology-CRYPTO Vol of LNCS.2000
  • 9Pedersen T P.Non-interactive and Information-theoretic Secure Verifiable Secret Sharing[].In J Feigenbaum Editor Advances in Cryptology-CRYPTO Vol of LNCS.1992
  • 10Herzberg A,Jarecki S,Krawczyk H,et al.Proactive Secret Sharing or: How to Cope with Perpetual Leakage[].In D CoppersmithEditor Advances in Cryptology-CRYPTO Vol of LNCS.1995

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部