期刊文献+

基于(r,n)门限的密钥恢复方案 被引量:4

Key Recovering Based on (r,n) Threshold Scheme
下载PDF
导出
摘要 随着计算机技术的普及发展,信息安全越来越受到重视,许多系统借助加密技术来保证信息在存储传输过程中的安全性,而密码系统中所使用的密钥或口令的安全性则成为系统的薄弱环节,密钥的丢失会给用户造成不必要的损失。文中介绍了一种应用(r,n)门限进行密钥恢复的新方案,该方案综合应用门限技术和因特网中广泛使用的回答问题认证模式来恢复丢失的密钥或口令。与传统密钥的恢复方案相比,具有较好的易用性和安全性。 With the development of computer technology, information security is becoming more important than ever before. Lots of system deploys cryptogmphic technologies to insure the information's security during its storing and transmitting processes. One of the most eommon problems with cryptography system is that users sometimes forget their passwords or even lose their private keys. So proposes a new approach to recover the lost keys or passwords based on ( r, n ) threshold scheme. Compared with the traditional key recovery scheme, it is more available and feasible.
出处 《计算机技术与发展》 2006年第10期134-136,共3页 Computer Technology and Development
关键词 门限方案 秘密共享 密钥恢复 threshold scheme secret sharing key recovering
  • 相关文献

参考文献5

  • 1Blakley G R.Safeguarding Cryptographic Keys[A].Proceedings of AFIPS 1979 National Computer Conference[C].Zürich,Switzerland:[s.n.],1979.
  • 2Shamir A.How to share a secret[A].In Communications of the ACM[C].Boston,America:[s.n.],1979.
  • 3Price W.A PGP Corporation White Paper:inside PGP Key Reconstruction[EB/OL].http://www.pgp.com/support/wpl.html,2003.
  • 4Trappe W,Washington L C著.密码学概论[M].邹红霞等译,北京:人民邮电出版社,2004.
  • 5Hsu C L,Wu T C.Authenticated encryption scheme with (t,n)shared verification[A].IEEE Proceedings Computer Digital Techniques[C].Oatarom,Canada:[s.n.],1998.

共引文献4

同被引文献24

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部