期刊文献+

用神经网络实现一般访问结构的多重秘密共享 被引量:1

Multi-secret sharing scheme for general access structure based on artificial neural network
下载PDF
导出
摘要 利用人工神经网络,结合RSA密码体制,实现了一种基于一般访问结构的多重秘密共享方案。在该方案中,秘密份额是人工神经网络收敛结果,各参与者共享多个秘密只需要维护一个秘密份额。共享多个秘密只需要进行一次人工神经网络训练,从而提高了方案的效率;在秘密分发和恢复时,利用RSA密码体制保证方案的安全性和正确性。分析表明,该方案是一个安全的、实用的秘密共享方案。 Based on RSA cryptosystem and artificial neural network, a new multi-secret sharing scheme for the general access structure is proposed. In the scheme, shadows are input value of converged artificial neural network. Participant shares many secrets with other participants by holding only one shadow. In the other word, to share many secrets, artificial neural network just converge once. As a result, scheme is more efficient. In the distributed and recovery phase, the security and validity of this scheme is same as the RSA cryptosystem. Analyses show that this scheme is computationally secure and practical scheme.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第20期4895-4896,4900,共3页 Computer Engineering and Design
关键词 秘密共享 神经网络 一般访问结构 秘密份额 安全 secret sharing artificial neural network (ANN) general access structure shadow security
  • 相关文献

参考文献8

二级参考文献48

  • 1Herzberg A, Jakobsson M, Jarecki S. Proactive Public-Key and Signature Schemes[C]. In Proceedings of the 4th Annual Conference on Computer Communications Security, 1997. 100-110.
  • 2Gennaro R, Jarecki S, Krawczyk H, et al. Rabin. Robust Threshold DSS Signatures[C]. Advances in Cryptology-Eurocrypt'96, International Conference on the Theory and Application of Cryptographic Techniques, 1996. 354-371.
  • 3Ostrovsky R, Yung M. How to Withstand Mobile Virus Attacks[C]. In Proceedings of the 10th Annual Symposium on Principles of Distributed Computing, 1991. 51-59.
  • 4Blakley G R. Safeguarding Cryptographic Keys[C]. Proceedings of the 1979 National Computer Conference, Volume 48 of AFIPS Conference Proceedings, 1979. 313-317.
  • 5Shamir A. How to Share a Secret[J]. Communication of the ACM, 1979,22(11):612-613.
  • 6Feldman P. A Practical Scheme for Non-Interactive Verifiable Secret Sharing[J]. In Proc.28th Annual Symp. 1987.427-437.
  • 7Gemmell P. An Introduction to Threshold Cryptography[J]. Cryptobytes, 1997: 7-12.
  • 8Pedersen T. Non-Interactive and Information-Theoretic Secure Verifiable secret Sharing[C]. Advances in Cryptology-Crypto'91, the 11th Annual International Cryptology Conference, 1992. 129-140.
  • 9Wu T, Malkin M, Boneh D. Building Intrusion Tolerant Applications[C].In Proceedings of the 8th USENIX Security Symposium, 1999. 79-91.
  • 10Herzberg A, Jarecki S, Krawczyk H, et al. Proactive Secret Sharing or: How to Cope with Perpetual Leakage[C]. Advances in Cryptology-Crypto'95, the 15th Annual International Cryptology Conference, 1995. 457-469.

共引文献94

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部