期刊文献+

参与者权重不同的防欺诈的动态秘密共享方案 被引量:5

Dynamic secure secret sharing scheme among weighted participants to prevent cheating
下载PDF
导出
摘要 在秘密共享方案的研究中,一般都进行Shamir门限秘密共享方案的研究,该方案基于多项式插值。论文基于中国剩余定理的参与者权重不同的秘密共享方案,提出了一个基于离散对数问题的困难性的参与者权重不同的防欺诈的动态秘密共享方案。方案中每个参与者的子秘密可多次使用,秘密更新时,无需更新参与者的子秘密,并且可以灵活地增加或删除。 Generally,people just research on Shamir threshold secret sharing scheme,which is based on polynomial interpolation. We have researched on secret sharing scheme among weighted participants,and showed a dynamic secret sharing scheme based on discrete logarithms which can detect cheaters.The shadow of every participant can be used by many times,and the secrets can be renewed without renewing the shadow of the participants,and a participant can be freely accepted or fired.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第29期8-10,共3页 Computer Engineering and Applications
基金 国家重点基础研究发展规划( 973)( the National Grand Fundamental Research 973 Program of China under Grant No.2004CB318000) 北京电子科技学院信息安全与保密重点实验室资助( No.YZDJ0712)
关键词 秘密共享 权重不同 中国剩余定理 离散对数 欺诈 secret sharing weighted Chinese Remainder Theorem discrete logarithms cheating
  • 相关文献

参考文献2

二级参考文献20

  • 1[1]G.R Blakey. Safeguarding Cryptographic Keys. Proc. NCC, AFIPS Press, Montvale, 1979,48: 313-317.
  • 2[2]G. R. Blakely and C. Meadows. Security of Ramp Schemes, Crypto'84, Lecture Notes inComputer Sciences 196, pp411-431.
  • 3[3]R. M. Capocelli, A. De Santis, L. Garganos etc. On the Size of Shares for Secret Sharing Schemes[J]. Journal of Cryptology,Vol.6, 1993, 157-167.
  • 4[4]J. Gathen and J. Gerharad, Modern Computer algebra[M]. Cambridge university press, 1999.
  • 5[5]J. He and E. Dawson. Shared Secret Reconstruction, Designs, Codes and Cryptography, 14, 221-237 (1998).
  • 6[6]John D. Lipson. Chinese Remainder and Interpolation algorithm, Proceedings of ACM Symposium on Symbolic and Algebraic Computation[M]. ACM Press, 1971.372-391.
  • 7[7]C. Padro,G. Saez, and J. Villar. Detection of Cheaters in Vector Space Secret Sharing Schemes,Designs,Codes and Cryptography.16, 75-85 (1999).
  • 8[8]A. Shamir. How to share a secret[J]. Communication of ACM, 1979,22: 612-613.
  • 9[9]G. J. Simmons. An introduction to shared secret/or shared control schemes and their applications, Contemporary Cryptology:The science of information integrity. IEEE Press,1992. 441-497.
  • 10[10]D. R. Stinson. Cryptography: Theory and Practice[M]. CRC Press, 1995.

共引文献24

同被引文献26

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部