期刊文献+

基于秘密共享理论的安全组通信研究综述 被引量:1

Survey of Secure Group Communication Based on Secret Sharing Theory
下载PDF
导出
摘要 秘密共享是密码学中的一个新课题,随着对其理论的不断研究,秘密共享方案越来越多地被应用到安全通信中,特别是在安全组通信中的应用使得通信的保密性、鲁棒性、完整性以及通信效率都得到了很大的提高。从秘密共享的基本理论出发,着重介绍了秘密共享在门限密码系统、组密钥管理、密钥托管、数字签名和认证以及分布式容侵系统中的应用,并且提出了秘密共享理论及其应用的发展趋势,为今后进一步的研究指明了方向。 Secret sharing is one of the new subjects of cryptography. As the theory of secret sharing developed, it is used in secure group communication more and more regularly. It enhanced the security, robust, integrity and the efficiency of communication. In this article, the theory of secret sharing is first showed, then its applications in threshold schemes, group communication, key escrow, digital authentication and intrusion tolerance system are introduced. At last, the direction of future research is proposed.
作者 王小康 杨明
出处 《计算机应用研究》 CSCD 北大核心 2006年第5期5-9,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(90304015/A01)
关键词 秘密共享 组密钥管理 门限方案 容侵系统 Secret Sharing Group Key Management Threshold Scheme Intrusion Tolerance System
  • 相关文献

参考文献30

  • 1A Shamir. How to Share a Secret [ J]. Communication of the ACM,1979,22( 11 ) :612-613.
  • 2G Blakley. Safeguarding Cryptographic Keys [ C ]. Proceedings of the National Conference, 248, AFIPS Press, 1979. 242- 268.
  • 3C Cachin. On-line Secret Sharing[ C]. Proceedings of the 5th IMA Conference on Cryptography and Coding, 1995. 190-198.
  • 4B Blakley, G Blakley, A H Chan. Threshold Schemes with Disenrollment[ C]. Advances in Cryptology Crypto' 92, Spfinger-Verlag,1993. 540-548.
  • 5D Stinson. Cryptography : Theory and Practice [ M ]. CRC Press,1995. 176-182.
  • 6B Chor, S Goldwasser, S Micali, et al. Verifiable Secret Sharing and Achieving in the Presence of Faults [ C ]. Proceedings of the 26th IEEE Symposium on Foundations of Computer Sciences( FOCS' 85 ),IEEE Computer Society, 1985. 383-395.
  • 7Pedersen. No-interactive and Information-theoretic Secure Verifiable Secret Sharing [ C ]. Proceedings of Crypto ' 91, Springer-Verlag Press, 1992. 129-140.
  • 8R Tso. A Study on Secret Sharing Schemes with Dishonest Dealers and Participants [ D ]. Doctoral Program in Risk Engineering at the University of Tsukuba,2004.
  • 9Ghodosi, Pieprrzyk. Cheating Prevention in Secret Sharing[ C]. Proceedings of ACISP' 2000, 2000. 328-341.
  • 10M Tompa, H Woll. How to Share a Secret with Cheaters[J]. Journal of Cryptology Archive, 1988, 1 (2) :133-138.

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部