期刊文献+

一种基于一般接入结构的抗欺骗秘密共享体制

An Anti-cheating Secret Sharing Scheme Based on a General Access Structure
下载PDF
导出
摘要 秘密共享体制是适用于保管极其重要信息的一种安全协议,其最大威胁是欺骗攻击,构造抗欺骗攻击的秘密共享体制具有重要意义.本文给出了一种有效构造方法,对于一般的接入结构也可以构造出抗欺骗攻击的体制,并且利用纠错编码的思想,使得体制的信息率有较大的提高. Secret sharing scheme is a kind of security protocol, which is suitable for keeping secret the most important information. But it may mostly be vulnerable to the attack by cheating. Therefore, it is very important to construct a scheme, which is able to withstand the attack of cheating. In this paper the authors present an effective method of construction. It is a way to construct an anti-cheating scheme on any given access structure. By the ideal of rectify-error coding,it has been significantly improved the information rate of the scheme.
出处 《中国科学院研究生院学报》 CAS CSCD 2006年第5期647-652,共6页 Journal of the Graduate School of the Chinese Academy of Sciences
关键词 抗欺骗 秘密共享 累积矩阵 纠错编码 spoof resistance, secret sharing, accumulation matrix, rectify-error code
  • 相关文献

参考文献16

  • 1Shamir A. How to share a secret. Communicationz of the ACM, 1979, 22(11) : 612 - 613.
  • 2Blakley GR. Safeguarding cryptographic keys. In: Proc. AFIPS 1979, National computer conference, 1979, 48:313 - 317.
  • 3Tompa M, Woll H. How to share a secret with cheaters. Journal of Cryptology, 1988. 133- 138.
  • 4Brickell EF, Stinson DR. The detection of cheaters in threshold scheme. In: Advances in Cryptology-CRYPTO' 88, New York: Springer-Verlag,1988. 564 - 577.
  • 5Carpentieri M. A perfect threshold secret sharing scheme to identify cheaters. Designs, Codes and Cryptography, 1995, 5(3):183- 197.
  • 6Rifa-Coma J. How to avoid the cheaters succeeding in the key sharing scheme. Designs, Codes and Cryptography, 1993, 3(3) :221 - 228.
  • 7张建中,肖国镇.一个可防止欺诈的秘密分享方案[J].电子科学学刊,1999,21(4):516-521. 被引量:12
  • 8许春香,肖鸿,肖国镇.安全的门限秘密共享方案,陈克非,李祥.密码学进展—CHINACRYPPT'2004,北京:科学出版社,2004:120~124.
  • 9Paro C, Soez G. Detection of cheaters in vector space secret sharing schemes. Desigru, Codes and Cryptography, 1999, 16(1):75-85.
  • 10许春香,傅小彤,肖国镇.预防欺诈的矢量空间秘密共享方案[J].西安电子科技大学学报,2002,29(4):527-529. 被引量:13

二级参考文献28

  • 1[1]Brickell E F, Davenport D M. On the classification of ideal secret sharing schemes. J. Cryptology, 1991; (4): 123 ~ 134
  • 2[2]Dj Golic J. On matroid characterization of ideal secret sharing schemes.J. Cryptology, 1998; (11):75~86
  • 3[3]Blundo C, De Santis A, Crescenzo C D, et al. Multi - secret sharing schemes (extended abstract). Advances in Cryptoloy - CRYPTO' 94.LNCS, Vol 839, Springer-Verlag, 1995: 150~163
  • 4[4]Jackson W A, Marten K M, O' Keefe C M. Ideal secret sharing schemes with multiple secrets. J Cryptology, 1996; (9): 237 ~250
  • 5[5]Tompa M, Woll H, How to share a secret with cheaters. Journal of Cryptology, 1988; 1: 133~ 138
  • 6[6]Carpentieri M, De Santis A, Vaccaro U. Size of shares and probability of cheating in threshold schemes. In: Proc. Of Eurocrypto'92,Lecture Notes in Computer Science, LNCS 765, Springer Verlag,1993: 118~ 125
  • 7[7]Kurosawa K, Obana S, Ogata W, t -cheater identifiable (k, n)threshold secret sharing schemes. Proc. Of Crypt' 95, Lecture Notes in Computer Science, LNCS 963, Springer Verlag, 1995:410 ~ 423
  • 8[8]Ogata W, Kurosawa K. Optimum secret sharing schemes secure against cheating. Proc. Of Eurocrypt'96, Lecture Notes in Computer Science,LNCS 1070, Springer Verlag, 1996:200~211
  • 9[9]MacWilliams F J, Sloane N J A. The theory of error -correcting codes. North - Holland, 1981:397 ~ 398
  • 10[10]Beth T, Jungnickel T D, Lenz H. Design Theory. Cambridge University Press, 1993:260~264

共引文献85

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部