期刊文献+

一个基于细胞自动机的多秘密共享方案 被引量:1

A Multi-secret Sharing Scheme Based on Cellular Automata
原文传递
导出
摘要 基于一维细胞自动机和中国剩余定理提出了一个新的多秘密共享方案.该方案将多个秘密打包成一个大秘密,将其作为细胞自动机的一个初始配置;通过对细胞自动机进行反向迭代来重构所共享的秘密.分析表明,该方案实现简单,在计算上是安全的,并且是一个完善的方案. Based on a one-dimensional cellular automata and the Chinese remainder theorem, a new multi-secret sharing scheme was proposed in this paper. Multiple secrets are packed into one big secret, which is considered as one of the initial configurations of the cellular automata; the backward iteration of the cellular automata is used to recover the shared secrets. Analyses show the proposed scheme can be implemented easily, and is a computationally secure and perfect one.
出处 《系统工程理论与实践》 EI CSCD 北大核心 2006年第6期113-116,共4页 Systems Engineering-Theory & Practice
基金 国家自然科学基金(50479055) 国家973重大项目(G1999035805)
关键词 秘密共享 多秘密共享 细胞自动机 中国剩余定理 secret sharing multi-secret sharing cellular automata Chinese mainder theorem
  • 相关文献

参考文献14

  • 1Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2Blakley G.Safeguarding cryptographic key[A].Proceedings of AFIPS 1979 Natl Conf[C].New York:AFIPS Press,1979,313-317.
  • 3Stinson D R.Cryptography:Theory and Practice[M].Second Edition.Boca Raton,New York:CRC Press,2002.
  • 4He J,Dawson E.Multistage secret sharing based on one-way function[J].Electronics Letters,1994,30(19):1591-1592.
  • 5Chien H Y,Jan J K,Tseng Y M.A practical (t,n) multi-secret sharing scheme[J].IEICE Transactions on Fundamentals.2000,E83-A(12):2762-2765.
  • 6Yang C C,Chang T Y,Hwang M S.A(t,n) multi-secret sharing scheme[J].Applied Mathematics and Computation,2004,151(2):483-490.
  • 7Pang L J,Wang Y M.A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing[J].Applied Mathematics and Computation,2005,167(2):840-848.
  • 8Von Neumann J.Theory of Self-Reproducing Automata[M].Champain,IL:University of Illinois Press,1966.
  • 9Wolfram S.Cryptography with cellular automata[A].Proc Advances in Cryptology (Crypto'85)[C].Lecture Notes in Computer Sciences,218,Berlin:Srpinger-Verlag,1986,429-432.
  • 10Wolfram S.Origins of randomness in physical system[J].Physical Review Letters,1985,55 (5):449-452.

同被引文献12

  • 1Shamir A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 2Blakley G R. Safeguarding cryptographic keys [C]//Proc of National Computer Conference. New York: American Federation of Information Processing Society, 1979:313-317.
  • 3He J, Dawson E. Multistage secret sharing based on one-way function[J]. Electronics Letters, 1994, 30(19):1591-1592.
  • 4Harn L. Comment: Multistage secret sharing based on one- way function [J]. Electronies Letters, 1995, 31 (4) : 262- 262.
  • 5He J, Dawson E. Multi-secret sharing scheme based on one- way function [J]. Electronics Letters, 1995, 31(2) : 93-95.
  • 6Chen T H, Wu C S. Ef{icient multi-secret image sharing based on Boolean operations [J]. Signal Processing, 2011, 91(1): 90-97.
  • 7Das A, Adhikari A. An efficient multi-use multi-secret sharing scheme based on hash function [J]. Applied Mathematics Letters, 2010, 23(9): 993-996.
  • 8Dehkordi M H, Mashhadi S. New efficient and practical verifiable multi-secret sharing schemes [J]. Information Sciences, 2008, 178(9): 2262-2274.
  • 9Lin H Y, Yeh Y S. Dynamic multi-secret sharing scheme [J]. International Journal of Contemporary Mathematical Sciences, 2008, 3(1): 37-42.
  • 10Eslami Z, Zarepour A J. A verifiable multi-secret sharing scheme based on cellular automata [J]. Information Sciences, 2010, 180(15): 2889-2894.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部