期刊文献+

基于可恢复模式的(v,r,n)门限改进方案

Improvement of the(v,r,n)threshold scheme based on a recoverable mode
下载PDF
导出
摘要 文章提出了一个具体完整的、实践性强的(v,r,n)门限改进方案,在保证方案的效率及安全性的基础上,通过二次拉格朗日插值及系统中心补发子密钥的方法,重点加强并实现了在出现欺骗者的情况下,系统的自我保护(即所谓的自恢复功能),且门限的次数没有降低;同时给出了与V-fairness方案的比较。 In this paper, an improved ( v, r, n )threshold scheme that is complete and practicable is proposed. In view of guaranteeing the efficiency and security of this scheme, the Lagrange interpolation polynomial is applied twice and the SA reissues some sub-secrets(shadows) to the t participants,thus the system's function of self protection is improved without reducing the degrees of the threshold. In the cases that cheaters appear, the system can recover itself. A comparison between this scheme and the V-fairness scheme is also made.
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第5期540-543,共4页 Journal of Hefei University of Technology:Natural Science
关键词 门限 拉格朗日插值 自恢复 threshold Lagrange interpolation polynomial self-recovery
  • 相关文献

参考文献9

  • 1Blakley G R.Safeguarding cryptographic keys[A].Merwin R E,Zanca J T,Smith M.Proceedings of AFIPS 1979 National Computer Conference(Vol 48)[C].American Federation of Information Processing Societies,1979.313-317.
  • 2Shamir A.How to share a secret[J].Communication of ACM,1979,22:612-613.
  • 3Carpentieri M.A perfect threshold secret sharing scheme to identify cheaters[J].Design,Codes and Cryptography,1995,5:183-187.
  • 4Chang C C,Hwang R J.An efficient cheater identification method for threshold scheme[J].IEE Proceedings-Computers and Digital Techniques,1997,144(1):23-27.
  • 5Rabin T,Ben-Or M.Verifiable secret sharing and multiparty protocols with honest majority[DB/OL].http://www.cs.huji.ac.il/course/2003/ns/Papers/RB89.pdf,2005-03-10.
  • 6Wu T C,Wu T S.Cheating detection and cheater identification in secret sharing schemes[J].IEE Proceedings-Computers and Digital Techniques,1995,142(5):367-369.
  • 7Lee Y C,Laih C S.A V-fairness (t,n) secret sharing scheme[J].IEE Proceedings-Computers and Digital Techniques,1997,144(5):245-248.
  • 8Huang Ren-Junn,Chang Chin-Chen.Enhancing the efficiency of (v,r,n)-fairness secret sharing scheme[A].IEE Proceedings of the 18th International Conference on Advanced Information Networking and Application (AINA'04)[C].2004.215-220.
  • 9Hsu C L,Wu T C.Authenticated encryption scheme with (t,n) shared verification[J].IEE Proceedings-Computers and Digital Techniques,1998,145(2):117-120.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部