期刊文献+

Secret sharing scheme with inherited characteristic 被引量:1

Secret sharing scheme with inherited characteristic
下载PDF
导出
摘要 To assure the shareholders can look for their "legal" attorneys to renew the secret, once the secret sharing scheme is initialized, a secret sharing scheme with inherited characteristic is constructed. In this scheme, each shareholder can produce a new share by his algorithm, which is equivalent to the primary one. Together with other shares, the primary secret can be renewed. Since this scheme is constructed not by replacing the primary share with a new share produced by the dealer in his primitive secret sharing scheme, so no matter how much shares the shareholder produces, these shares can not be gathered together to renew the secret in this scheme. Compared with the existing secret sharing schemes, this scheme provides more agility for the shareholders by investing each of them a function but not affect its security. To assure the shareholders can look for their "legal" attorneys to renew the secret, once the secret sharing scheme is initialized, a secret sharing scheme with inherited characteristic is constructed. In this scheme, each shareholder can produce a new share by his algorithm, which is equivalent to the primary one. Together with other shares, the primary secret can be renewed. Since this scheme is constructed not by replacing the primary share with a new share produced by the dealer in his primitive secret sharing scheme, so no matter how much shares the shareholder produces, these shares can not be gathered together to renew the secret in this scheme. Compared with the existing secret sharing schemes, this scheme provides more agility for the shareholders by investing each of them a function but not affect its security.
出处 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期916-918,共3页 系统工程与电子技术(英文版)
基金 This project was supported by Young Teacher Foundation of North China Elec. Power Univ.(200521001)
关键词 CRYPTOGRAPHY secret sharing scheme INHERITED equivalent class. cryptography, secret sharing scheme, inherited, equivalent class.
  • 相关文献

参考文献8

  • 1[1]Shamir A.How to share a secret.Communications of the ACM,1979,22(11):612~613.
  • 2[2]Blakley G R.Safeguaring cryptographic keys.Proc.AFIPS National Computer Conference,New York,1979:313~317.
  • 3[3]Ye Zhenjun,Meng Fanzhen.Special secret sharing scheme with the function of assignment.Journal of Systems Engineering and Electronics,2005,16 (3):651~653.
  • 4[4]MacKenzie P,Reiter M.Delegation of cryptographic servers for capture-resilient devices.Proc.of the 8th ACM Conference on Computer and Communications Security,ACM,2001:10~19.
  • 5[5]Nicolosi A,Krohn M,Dodis Y,et al.Proactive two-party signatures for user authentication.Proc.of the 10th Annual Network and Distributed System Security Symposium,2003:233~248.
  • 6[6]Fehr S,Maurer U.Linear VSS and distributed commitments based on secret sharing and pairwise checks.Proc.CRYPTO 2002,Springer Verlag LNCS 2442,2002:565~580.
  • 7[7]Zhou L.Towards fault-tolerant and secure on-line services.Ph.D.Thesis,Cornell University,2001.
  • 8[8]Okada K,Kurosawa K.MDS secret sharing scheme secure against cheaters.IEEE Transactions on Information Theory,2000,46(3):1078~1081.

同被引文献11

  • 1叶振军,孟繁桢.Special secret sharing scheme with the function of assignment[J].Journal of Systems Engineering and Electronics,2005,16(3):651-653. 被引量:3
  • 2叶振军,孙淑珍,李国东.有限秘密下指派秘密共享方案的构造[J].微电子学与计算机,2007,24(3):111-112. 被引量:2
  • 3Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 4Blakley G R. Safeguaring cryplographic keys[C]//Proc, of AFIPS National Computer Conference, New York, 1979 : 313 - 317.
  • 5Gray R. Agent Tel: a flexible and secure mobile agent system [D]. Hanover: Dartmouth College, 1997.
  • 6Feldman P. A practical scheme for non-interactive verifiable secret sharing[C]//Proc, of 28th IEEE Symposium on Founda tions of Computer Science, IEEE Computer Society, 1987 :427 - 437.
  • 7Pedersen T P. Non-interactive and information-theoretic secure verifiable secret sharing [ C ] // Advances in Cruptology- CRYPTO, Lecture Notes in Computer Science, Berlin, 1992, 576:129 - 140.
  • 8Schoenmakers B. A simple publicly verifiable secret sharing scheme and its applications to electronic voting[C]//CRYPTO, Springer Verlag, 1999: 32 - 46.
  • 9Herzberg A, Jarecki S, Krawczyk H, et al. Proactive secret sharing or: how to cope with perpetual leakage[C]//Proc, of CRYPTO, Spring Verlag LNCS, 1996 : 339 - 352.
  • 10Laszlo Csirnaz. Secret sharing schemes on graphs[J].Studia Mathematica, 2007, 44(3):297 - 306.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部