期刊文献+

一个可验证的秘密共享新个体加入协议 被引量:5

Verifiable Protocol for Member Expansion in Secret Sharing Schemes
下载PDF
导出
摘要 针对门限秘密共享方案,提出了一个可验证的新个体加入协议.应用指数运算来验证新产生份额的真实性,从而预防系统中可能出现的主动攻击.该协议具有无需信任中心,无需改动原有参与者的份额,仅需t(t为门限)个老成员合作产生新份额,仅需6t次广播等优点.分析与验证表明,该协议是正确的,与现有协议相比,其密钥管理简单,安全性更高,具有良好的可靠性和可用性. A verifiable protocol for member expansion in the threshold sharing schemes that create n shares of the secret for n participants was proposed. The authenticity of the new share can be verified by using exponential computation, which makes the protocol defend against active adversaries. Without a trusted center and modifying the shares of old participants, the protocol needs that t (t is the threshold) old participants cooperate to generate and to distribute the new share, and there are only 6t times broadcasting. The validity of the proposed protocol was verified. Compared with the existing protocols, the proposed protocol has a higher security and is easier in key management and better in reliability and usability.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2006年第2期207-210,共4页 Journal of Xi'an Jiaotong University
基金 国家自然科学基金资助项目(50479055) 国家重点基础研究发展规划资助项目(G1999035805)
关键词 秘密共享 新个体 验证 信任中心 secret sharing new member verify trusted center
  • 相关文献

参考文献1

二级参考文献12

  • 1Desmedt Y. Some recent research aspects of threshold cryptography. Irr Okamoto R, Davida G, Mambo M, eds. Information Security. LNCS 1396. Berlin: Springer-Verlag, 1997. 158-173.
  • 2Luo H, Lu S. Ubiquitous and robust authentication services for Ad Hoc wireless networks. Technical Report, TR-200030,Department of Computer Science, UCLA, 2000.
  • 3Wong TM, Wang CX, Wing JM. Verifiable secret redistribution for archive systems. In: Proc of the 1st Int'l Security in Storage Workshop. 2002.
  • 4Shamir S. How to share a secret Communications of the ACM, 1979,22(11 ):612-613.
  • 5Pedersen TP. A threshold cryptosystem without a trusted party. In:Proc of the Eurocrpt 1991. LNCS 547. Berlin: Springer-Verlag,1991. 522-526.
  • 6Takaragi K, Miyazaki K. A threshold digital signature issuing scheme without secret communication. In: Proc of the IEEE Conf. 1998.
  • 7EIGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans on IT, 1985,31(4):469-472.
  • 8Desmedt Y. Some recent research aspects of threshold cryptography. In: Okamoto R, Davida G, Mambo M, eds. Information Security. LNCS 1396. Berlin: Springer-Verlag, 1997. 158-173.
  • 9Wong TM, Wang CX, Wing JM. Verifiable secret redistribution for archive systems. In: Proc of the 1st Int'l Security in Storage Workshop. 2002.
  • 10Pedersen TP. A threshold cryptosystem without a trusted party. In:Proc. of the Eurocrpt 1991. LNCS 547. Berlin: Springer-Verlag,1991. 522-526.

共引文献15

同被引文献35

  • 1于佳,李国文,郝蓉,程震.一个实用的门限方案成员加入协议[J].北京邮电大学学报,2006,29(z2):1-3. 被引量:1
  • 2董攀,况晓辉,卢锡城.一种秘密共享新个体加入协议(英文)[J].软件学报,2005,16(1):116-120. 被引量:16
  • 3于佳,李大兴,范玉玲.基于加法共享的可验证秘密再分发协议[J].计算机研究与发展,2006,43(1):23-27. 被引量:6
  • 4于佳,孔凡玉,李大兴.Verifiable Secret Redistribution for Proactive Secret Sharing Schemes[J].Journal of Shanghai Jiaotong university(Science),2006,11(2):236-241. 被引量:4
  • 5金永明,徐秋亮.对一种秘密共享新个体加入协议的密码分析[J].计算机工程与应用,2006,42(21):90-91. 被引量:2
  • 6Chor B, Goldwasser S, Micali S, et al. Verifiable secret sharing and achieving simultaneity in the presence of faults[ A]. Proceedings of 26 IEEE Symposium on Foundations of Computer Science [ C ]. Washington: IEEE Computer Society, 1985. 383 -395.
  • 7Stadler M. Publicly verifiable secret sharing[ A]. Advances in Cryptology-EURO-CRYPT'96 [ C ]. Berlin: Springer-Verlag, 1996. 190 - 199.
  • 8Fujisaki E, Okamoto T. A practical and provably secure scheme for publicly verifiable secret sharing and its application [ A]. EUROCRYPT'98 [ C ]. Berlin: Springer-Verlag, 1996. 32 -46.
  • 9Schoenmakers B. A simple publicly verifiable secret sharing scheme and its application to electronic voting [ A ]. Proceeding of Advances in Cryptology-Crypto'99 [ C]. Berlin: Springer-Verlag, 1999. 148 - 164.
  • 10Yu Jia, Kong Fanyu, Hao Rong. Publicly verifiable secret sharing with enrollment ability [ A ]. Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing 2007, Eighth ACIS International Conference [ C ]. Qingdao, China: IEEE Computer Society, 2007. 194 - 199.

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部