期刊文献+

一种新的可验证的多秘密分享方案 被引量:8

Novel verifiable multi-secret sharing scheme
下载PDF
导出
摘要 2005年,Q.Li,Z.Wang,X.Mu等人[11]基于Asmuth的模可验证秘密分享(modular verifiable secret sharing)提出了一种新的可验证的秘密分享方案,但该秘密分享算法并不实用,此方案也不是多秘密分享方案。提出了一个新的可验证的多秘密分享方案,该方案可以同时恢复多个秘密,秘密份额可以重用。 In 2005,Q.Li,Z.Wang,X.Mu et al.IH1 proposed a new verifiable secret sharing scheme based on the Asmuth et al.'s modular verifiable secret sharing scheme.But the algorithm to share the secret is not practical,and the scheme is not a multi-secret sharing.In this paper,we propose a novel verifiable multi-secret sharing scheme by using the improved verification algorithm. The scheme can recover several secrets parallelly,and the secret shadows can be reused.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第4期131-133,共3页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.10271069) 陕西省自然科学基金(the NaturalScience Foundation of Shaanxi Province of China under Grant No.2004A14) 陕西师范大学研究生培养创新基金资助项目(2006CXS018)。
关键词 密码学 可验证性 多秘密分享 安全信道 cryptography ~ verification muhi-secret sharing security channel
  • 相关文献

参考文献13

  • 1Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2Blakley G.Safeguarding cryptographic keys[C]//Proc AFIPS 1979 National Computer Conference.New York:AFIPS Press,1979:313-317.
  • 3Chor B,Goldwasser S,Micali S,et al.Verifiable secret sharing and achieving simultaneity in the presence of faults[C]//Proc 26th IEEE Symp FOCS,1985:251-260.
  • 4Tompa M,Woll H.How to share a secret with cheaters[J].Journal Cryptology,1988(1):133-138.
  • 5Chor B,Goldwasser S,Micali S,et al.Verifiable secret sharing and achieving simultaneity in the presence of faults[C]//Proceedings of the 26^th IEEE Symposiumon the Foundations of Computer Science (FOCS),1985:383-395.
  • 6Asmuth C,Bloom J.A modular approach to key safeguarding[J].IEEE Trans on Information Theory,1983,IT-29(547):208-210.
  • 7Chien H-Y,Tseng J-K.A practical (t,n) multi-secret sharing scheme[J].IEICE Transactions on Fundamentals,2000,83 (12):2762-2765.
  • 8He J,Dawson E.Multistage secret sharing based on one-way function[J].Electronics Letters,1994,30(19):1591-1592.
  • 9He J,Dawson E.Multisecret-sharing scheme based on one-way function[J].Electronics Letters,1995,31 (2):93-95.
  • 10Yang C-C,Chang T-Y,Hwang M-S.A (t,n) multi-secret sharing scheme[J].Appl Math Comput,2004,151:483-490.

同被引文献51

  • 1许春香,肖国镇.门限多重秘密共享方案[J].电子学报,2004,32(10):1688-1689. 被引量:41
  • 2庞辽军,姜正涛,王育民.基于一般访问结构的多重秘密共享方案[J].计算机研究与发展,2006,43(1):33-38. 被引量:22
  • 3Shamir A.How to Share a Secret[J].Communicatious of the ACM,1979,22(11):612-613.
  • 4Blakley G Safeguarding Cryptographic Keys[C]//Proc.of AFIPS'79 National Computer Conference.New York,USA:AFIPS Press,1979:313-317.
  • 5TompaM,Woll H.How to Share a Secret with Cheaters[J].Journal of Cryptology,1988.1(2):133-138.
  • 6Chor B,Goldwasser S,Micali S,et al.Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults[C]//Proc.of the 26th IEEE Symp..[S.l.]:IEEE Press,1985:251-260.
  • 7Zhao Jianjie,Zhang Jianzhong,Zhao Rong.A Practical Verifiable Multi-secret Sharing Scheme[J].Computer Standards&Interfaces,2007,29(1):138-141.
  • 8Chien H,Tseng J.A Practical(f,n)Multi-secret Sharing Scheme[J].IEICE Transactions on Fundamentals of Electronics.Comm.and Computer,2000.83-A(12):2762-2765.
  • 9Dawson H J,Dawson E.Multisecret-sharing Scheme Based on One-way Function[J].Electronics Letters,1995,31(2):93-95.
  • 10Yang Chouchen,Chang Tingyi,Hwang Miashiang.A(t,n)Multi-secret Sharing Scheme[J].Applied Mathematics and Computation,2004,151(2):483-490.

引证文献8

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部