期刊文献+

一个门限多秘密共享方案

Threshold Multiple Secret Sharing Scheme
下载PDF
导出
摘要 提出了一个门限多重秘密共享方案,其实施简单、安全。在此方案中每一个参与者通过保存一个子秘密而共享多个秘密,参与者的子秘密可反复使用。此方案能够检测欺骗,并能通过重新选择参数而更新秘密。 A threshold multiple secret sharing scheme is proposed,it's secure and easy.Each participant can share many secrets with other participants by holding only one shadow,and the shadow can be used repeat.The cheaters can be detected,and the shadow can de renewed by select new data.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第36期134-135,共2页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(10271069) 陕西省自然科学基金计划项目(2004A14)
关键词 多秘密共享 门限方案 离散对数问题 RSA multiple secret sharing threshold scheme discrete logarithm problem RSA
  • 相关文献

参考文献9

  • 1Shamir A.How to share a secret[J].Communication of the ACM,1979,24(11):612-613.
  • 2Blakly G R.Safeguarding cryptographic keys[C]//Proceedings of the national computer conference,American federation of irformation processing societies,1979,48:242-268.
  • 3Tompa M,Woll H.How to share a secret with cheaters[J].Journal of Cryptology,1988,1 (2):133-138.
  • 4Schneier B,著.应用密码学协议算法与c源程序[J].吴世忠,祝世雄,张文政,译.北京:机械工业出版社,2000-01.
  • 5Hwang R J,Chang C C.An on-line secret sharing scheme for multi-secret[J].Computer Communications,1998,21 (13):1170-1176.
  • 6Yang C C,Chang T Y,Hwang M S.A (t,n) multi-secret secret sharing scheme[J].Applied Mathematics and Computation,2004,151(2):483-490.
  • 7Chien H Y,Jan J K,Tseng Y M.A practical (t,n) multi-secret s haring scheme[J].IEICE Transactions on fundamentals,2000,83(12):2762-2765.
  • 8Harn L.Efficient sharing of multi-secrets[J].IEE ProceedingsComputers and Digital Techniques,1995,142(3):237-240.
  • 9庞辽军,王育民.基于RSA密码体制(t,n)门限秘密共享方案[J].通信学报,2005,26(6):70-73. 被引量:32

二级参考文献11

  • 1SHAMIR A. How to share a secret[J]. Communications of the ACM,1979, 22(11): 612-613.
  • 2BLAKLEY G. Safeguarding cryptographic keys[A]. Proc AFIPS 1979 National Computer Conference[C]. New York: AFIPS Press, 1979.313-317.
  • 3ASMUTH C, BLOOM J. A modular approach to key safegrarding[J].IEEE Transactions on Information Theory, 1983, 29(2): 208-210.
  • 4KARNIN E D, GREEN J W, HELLMAN M E. On sharing secret system[J]. IEEE Transactions on Information Theory, 1983, 29(1): 35-41.
  • 5HARN L. Efficient sharing (broadcasting) of multiple secrets[J]. IEE Proceedings-Computers and Digital Techniques, 1995, 142(3): 237-240.
  • 6CHIEN H Y, JAN J K, TSENG Y M. A practical (t, n) multi-secret sharing scheme [J]. IEICE Transactions on Fundamentals, 2000, 83(12): 2762-2765.
  • 7YANG C C, CHANG T Y, HWANG M S. A (t, n) multi- secret sharing scheme[J]. Applied Mathematics and Computation, 2004,151(2): 483-490.
  • 8HWANG R J, CHANG C C. An on-line secret sharing scheme for multi-secrets[J]. Computer Communications, 1998, 21(13): 1170-1176.
  • 9RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public key cryptosystem [J]. Communications of the ACM, 1978, 21(2): 120-126.
  • 10CHANG C C, HORUG H J, BUEHRER D J. A cascade exponentiation evaluation scheme based on the lempel-ziv-welch compression algorithm[J]. Journal of Information Science and Engineering, 1995, 11(3): 417-431.

共引文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部