期刊文献+

基于特殊差分方程的安全可验证门限秘密共享 被引量:2

Secure threshold secret sharing scheme based on special difference equation
下载PDF
导出
摘要 在秘密共享方案的研究中,一般都进行Shamir(n,t)门限秘密共享方案的研究,该方案是基于多项式插值的门限方案。研究了基于特殊差分方程的门限秘密共享方案,同时,考虑了此类门限方案的安全性,最后基于特殊差分方程给出了安全可验证的门限秘密共享方案。可以得出,给出的门限秘密共享方案的信息率为1/2,且对于防欺诈是无条件安全的。 Generally,people just research on Shamir(n,t) threshold secret sharing scheme,which is based on polynomial interpolation.We research on threshold secret sharing scheme,what is more,we consider the security of the scheme and show a secure threshold secret sharing scheme based on special difference equation.Obviously,the information rate of the scheme is 1/2,and the scheme is unconditionally secure.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第23期6-7,11,共3页 Computer Engineering and Applications
基金 国家重点基础研究发展规划(973)(the National Grand Fundamental Research 973 Program of China under Grant No.2004CB318000) 北京电子科技学院信息安全与保密重点实验室项目(No.YZDJ0501)
关键词 秘密共享 安全 差分方程 门限 secret sharing security difference equation threshold
  • 相关文献

参考文献7

  • 1Blakey G R.Safeguarding cryptographic keys[C]//Proc NCC.Montvale:AFIPS Press,1979,48:313-317.
  • 2Shamir A.How to share a secret[J].Comm ACM,1979,22:612-613.
  • 3Asmuth C,Bloom J.A modular approach to key safeguarding[J].IEEE Transactions on Information Theory,1983,29(2):208-210.
  • 4Karnin E D Hellman.On secret sharing systems[J].IEEE Transactions on Information Theory,1983,29 (1):35-41.
  • 5王明生,刘卓军,张艳硕.权重不同参与者之间的秘密共享(英文)[J].北京电子科技学院学报,2005,13(2):1-8. 被引量:20
  • 6许春香,肖鸿,肖国镇.安全的门限秘密共享方案[C]//第八届中国密码学会学术会议论文集,2004:120-124.
  • 7李滨.基于特殊访问权限的差分秘密共享方案[J].四川大学学报(自然科学版),2006,43(1):78-83. 被引量:20

二级参考文献20

  • 1[1]G.R Blakey. Safeguarding Cryptographic Keys. Proc. NCC, AFIPS Press, Montvale, 1979,48: 313-317.
  • 2[2]G. R. Blakely and C. Meadows. Security of Ramp Schemes, Crypto'84, Lecture Notes inComputer Sciences 196, pp411-431.
  • 3[3]R. M. Capocelli, A. De Santis, L. Garganos etc. On the Size of Shares for Secret Sharing Schemes[J]. Journal of Cryptology,Vol.6, 1993, 157-167.
  • 4[4]J. Gathen and J. Gerharad, Modern Computer algebra[M]. Cambridge university press, 1999.
  • 5[5]J. He and E. Dawson. Shared Secret Reconstruction, Designs, Codes and Cryptography, 14, 221-237 (1998).
  • 6[6]John D. Lipson. Chinese Remainder and Interpolation algorithm, Proceedings of ACM Symposium on Symbolic and Algebraic Computation[M]. ACM Press, 1971.372-391.
  • 7[7]C. Padro,G. Saez, and J. Villar. Detection of Cheaters in Vector Space Secret Sharing Schemes,Designs,Codes and Cryptography.16, 75-85 (1999).
  • 8[8]A. Shamir. How to share a secret[J]. Communication of ACM, 1979,22: 612-613.
  • 9[9]G. J. Simmons. An introduction to shared secret/or shared control schemes and their applications, Contemporary Cryptology:The science of information integrity. IEEE Press,1992. 441-497.
  • 10[10]D. R. Stinson. Cryptography: Theory and Practice[M]. CRC Press, 1995.

共引文献35

同被引文献15

  • 1郭现峰,袁丁.一个基于SAS思想的防欺诈的秘密共享方案[J].四川师范大学学报(自然科学版),2005,28(5):627-630. 被引量:2
  • 2李滨.基于特殊访问权限的差分秘密共享方案[J].四川大学学报(自然科学版),2006,43(1):78-83. 被引量:20
  • 3Blakley G R.Safeguarding cryptographic keys[C]//Proc AFIPS 1979, National Computer Conference.New York, USA:AFIPS Press, 1979.
  • 4Shamir A.How to share a secret[J].Communieations of the ACM, 1979,22( 11 ) :612-613.
  • 5Okada K,Kurosawa K.MDS secret sharing scheme secure against cheaters[J].IEEE Transactions on Information Theory,2000,46(3): 1078-1081.
  • 6Rabin T,Ben-Or M.Verifiable secrets sharing and multiparty protocols with honest majority[C]//Johnson D S.Proceedings of the 21st Annual ACM Symposium on Theory of Computing.New York:ACM Press, 1989: 73-85.
  • 7Yang Chouchen,Chang Tingyi,Hwang Minshiang.A (t,n) multi-secret sharing scheme[J].Applied Mathematics and Computation,2004, 151(2):483-490.
  • 8He J,Dawson E.Muhi-secret sharing scheme based on one-way function[J].Electronics Letters, 1995,31 (2) : 93-95.
  • 9Zhao Jianjie,Zhang Jianzhong,Zhao Rong.A practical verifiable multi-secret sharing seheme[J].Computer Standards & Interfaces, 2007,29( 1 ) : 138-141.
  • 10Shao Jun, Cao Zhenfu.A new efficient(t,n) verifiable multi-secret sharing(VMSS) based on YCH scheme[J].Applied Mathematics and Computation, 2005,168( 1 ) : 135-140.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部