期刊文献+

可验证的(t,n)门限秘密共享方案及其安全性 被引量:3

Verifiable(t,n) Threshold Secret-Sharing Scheme and Its Security
下载PDF
导出
摘要 为了在无可信中心存在的情况下将一个秘密在一组参与者之间实现共享,并且防止参与者间的相互欺骗,提出了一种动态的、可验证的(t,n)门限秘密共享方案.在该方案中,各参与者的秘密份额由所有参与者共同协商,而不是由秘密分发者进行分配.因此,在秘密分发过程中,秘密分发者只需计算一些公开信息,而无需向各参与者传递任何信息.在秘密重构过程中,每个合作的参与者只需向秘密计算者提交一个由秘密份额计算的伪份额,且秘密计算者能够验证伪份额的有效性.方案的安全性是基于离散对数问题的难解性. In order to share a secret among a group of participants without a trusted center and to prevent the participants from cheating each other, a dynamic and verifiable (t, n) threshold secret-sharing scheme is proposed. In this scheme, the secret shadow of each participant is negotiated by all participants, and the secret dealer does not have to distribute any secret shadow. So, in the process of secret distribution, the dealer is only asked to compute some public values without sending any information to each participant. Furthermore, in the process of secret recovery, each participant of a cooperative only submits a pseudo-shadow computed via the secret shadow to the secret computer, and anyone is allowed to check the validity of the pseudo-shadow. The security of the can be effectively guaranteed due to the difficulty in solving the discrete logarithm problem.
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第1期102-105,共4页 Journal of South China University of Technology(Natural Science Edition)
基金 国家"973"计划项目(G1999035805) 国家自然科学基金资助项目(50479055)
关键词 数据安全 秘密共享 门限方案 验证 data security secret sharing threshold scheme verification
  • 相关文献

参考文献2

二级参考文献9

共引文献14

同被引文献27

  • 1唐春明,刘卓军,王明生.一种实用的可验证秘密共享方案[J].计算机工程与应用,2006,42(15):129-133. 被引量:5
  • 2Blakley G R.Safeguarding cryptographic keys[C]//Proceeding of AFIPS 1979 the National Computer Conference.NewYork:AFIPS,1979:313-317.
  • 3Shamir A.How to share a secret[J].Communications of ACM,1979,22:612-613.
  • 4Asmuth C,Bloom J.A modular approach to key safeguarding[J].IEEE Transactions on Information Theory,1983,IT-29(2):208-210.
  • 5Karnin E D,Greene J W,Hellman M E.On sharing secret systems[J].IEEE Transactions on Information Theory,1983,IT-29:35-41.
  • 6Chor B,Goldwasser S,Micali S,et al.Verifiable secret sharing and achieving simultaneity in the presence of faults[C]// Proceedings of 26th IEEE Symposium on Foundations of Computer Science.Oregon,Portland:IEEE,1985:383-395.
  • 7Stadler M.Publicly verifiable secret sharing[C]// Proceedings of EUROCRYPT96,LNCS 1070.Berlin:Springer-Verlag,1996:190-199.
  • 8Benaloh J,Leichter J.Generalized secret sharing and monotone functions[C]// Advance in Cryptology-Crypto' 88.Berlin:Springer-Verlag,1990:27-35.
  • 9Jackson W A,Martin K M,O' KEEFE M.Multisecret threshold schemes[C] // Advances in Cryptology-Crypto'93.Berlin:Springer-Verlag,1993:126-135.
  • 10He J,Dawson E.Multisecret sharing scheme based on one way function[J].Electronics Letters,1995,31 (2):93-95.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部