期刊文献+

对一种秘密共享新个体加入协议的密码分析 被引量:2

Cryptanalysis of a Secret Sharing Protocol for Member Expansion
下载PDF
导出
摘要 董攀等人基于Shamir的(t,n)门限方案提出了一种为新个体分配秘密份额的方案。该方案具有无需信任中心,无需改动其他人秘密份额等优点。然而该方案存在一个缺陷,导致任意成员都可以求出其他成员的子密钥,进而重构群组密钥。论文对此进行了密码分析,并给出了详细的攻击方法。 Dong et al. have proposed a new secret redistribution protocol based on Shamir's (t,n) threshold scheme.lt has some advantages.For example,it doesn't need a trusted center,the secret sharing doesn't need to change.However,the scheme has a disadvantage.Any of the dishonest members can get other member's secret share and reconstruct the secret key of the group.In this paper,the cryptanalysis of Dong et al.'s scheme is given.And the detailed attack is presented.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第21期90-91,共2页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(编号:60373026) 山东省自然科学基金资助项目(编号:Y2003G02)
关键词 协议 秘密共享 门限 新个体 protocol,secret sharing,threshold,new member
  • 相关文献

参考文献1

二级参考文献12

  • 1Desmedt Y. Some recent research aspects of threshold cryptography. Irr Okamoto R, Davida G, Mambo M, eds. Information Security. LNCS 1396. Berlin: Springer-Verlag, 1997. 158-173.
  • 2Luo H, Lu S. Ubiquitous and robust authentication services for Ad Hoc wireless networks. Technical Report, TR-200030,Department of Computer Science, UCLA, 2000.
  • 3Wong TM, Wang CX, Wing JM. Verifiable secret redistribution for archive systems. In: Proc of the 1st Int'l Security in Storage Workshop. 2002.
  • 4Shamir S. How to share a secret Communications of the ACM, 1979,22(11 ):612-613.
  • 5Pedersen TP. A threshold cryptosystem without a trusted party. In:Proc of the Eurocrpt 1991. LNCS 547. Berlin: Springer-Verlag,1991. 522-526.
  • 6Takaragi K, Miyazaki K. A threshold digital signature issuing scheme without secret communication. In: Proc of the IEEE Conf. 1998.
  • 7EIGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans on IT, 1985,31(4):469-472.
  • 8Desmedt Y. Some recent research aspects of threshold cryptography. In: Okamoto R, Davida G, Mambo M, eds. Information Security. LNCS 1396. Berlin: Springer-Verlag, 1997. 158-173.
  • 9Wong TM, Wang CX, Wing JM. Verifiable secret redistribution for archive systems. In: Proc of the 1st Int'l Security in Storage Workshop. 2002.
  • 10Pedersen TP. A threshold cryptosystem without a trusted party. In:Proc. of the Eurocrpt 1991. LNCS 547. Berlin: Springer-Verlag,1991. 522-526.

共引文献15

同被引文献16

  • 1董攀,况晓辉,卢锡城.一种秘密共享新个体加入协议(英文)[J].软件学报,2005,16(1):116-120. 被引量:16
  • 2李慧贤,程春田,庞辽军.一个可验证的秘密共享新个体加入协议[J].西安交通大学学报,2006,40(2):207-210. 被引量:5
  • 3Shamir,A.How to Share a Secret[C] // Comm.ACM.New York:ACM,1979:612-613.
  • 4T.M.Wong,Chen-xi Wang,J.M.Wing.Verifiable Secret Redistribution for Archive System[C] // IEEE Security in Storage Workshop.Washington:IEEE Computer Society,2002:94-106.
  • 5Xiao Li,Mingxing He.A Protocol of the Member-join in a Secret Sharing Scheme[C] // Information Security Practice and Experience,LNCS 3903.Berlin:Springer,2006:134-141.
  • 6Raylin Tso,Ying Miao,et al.A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment[J].Infor-mation and media Technologies,2006,1(1):606-614.
  • 7David Schultz,Barbara Liskov,and Moses Liskov.Mobile Proactive Secret Sharing[C] //In Twenty-Seventh Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC'08).Toronto,Canada:ACM 978,2008:458.
  • 8Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 9Blakley G.Safeguarding cryptographic key[C]//AFIPS 1979 Nalt Conf,New York,USA,1979.
  • 10Yang C C,Chang T Y,Hwang M S.A(t,n) multi-secret sharing scheme[J].Applied Mathematics andComputation,2004,151 (2):483-490.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部