期刊文献+

适用于任意接入结构的可验证多秘密分享方案 被引量:2

Verifiable multi-secret sharing schemes applicable to arbitrary access structures
下载PDF
导出
摘要 对一般接入结构上的可验证多秘密分享进行了研究,给出了可适用于任意接入结构的一类可验证多秘密分享方案的构造方法。用这种方法构造的可验证多秘密分享方案具有以下性质:可在一组分享者中同时分享多个秘密;分发者发送给每一分享者的秘密份额都是可公开验证的;关于每一秘密的公开信息也是可公开验证的;恢复秘密时可防止分享者提供假的份额。分析表明,用此方法构造的可验证多秘密分享方案不仅是安全的,而且是高效的。 Verifiable multi-secret sharing on general access structures was studied. A method of construct verifiable secret sharing schemes with arbitrary access structure was given. The verifiable multi-secret sharing schemes constructed by this method have the following properties: multiple secrets can be shared at the same time in a group of shareholders. The secret shares sent to shareholders are publicly verifiable. The public information with respect to each shared secret is publicly verifiable. And the supply of false shares in the process of secret recovery can be prevented. Analysis shows that the verifiable multi-secret sharing schemes constructed by our method are not only secure, but also efficient.
出处 《通信学报》 EI CSCD 北大核心 2007年第11期59-64,共6页 Journal on Communications
基金 国家自然科学基金资助项目(60673070) 江苏省自然科学基金资助项目(BK2006217) 西安电子科技大学教育部计算机网络与信息安全重点实验室开放课题资助项目(20040105)~~
关键词 秘密分享 接入结构 可验证秘密分享 多秘密分享 RSA公钥体制 ecret sharing access structure verifiable secret sharing multi-secret sharing RSA public key cryptosystem
  • 相关文献

参考文献12

  • 1SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 2BLAKELY G R. Safeguarding cryptographic keys[A]. Proceedings of the AFIPS 1979 National Computer Conference[C]. New York, USA, 1979. 313:317.
  • 3JACKSON W A, MARTIN K M, O'KEEFE M. Multisecret threshold schemes[A]. Advances in cryptology-CRYPTO'93[C]. Santa Barbara, California, USA, LNCS 773, Springer-Verlag, Berlin, 1993. 126-135.
  • 4HE J, DAWSON E. Multisecret sharing scheme based on one way function[J]. Electronics Letters, 1995, 31(2): 93-95.
  • 5LAIH C, HARN L, LEE J, et al. Dynamic threshold scheme based on the definition of cross-productin an N-dimensional linear space[A]. Proceedings of Crypto'89[C]. Santa Barbara, California, USA, LNCS 435, Springer-Verlag, Berlin,1990. 20-24.
  • 6SUN H M, SHIEH S P. Construction of dynamic threshold schemes[J]. Electronics Letters, 1995, 30(24): 2023-2024.
  • 7HWANG S J, CHANG C C, YANG W P. A dynamic secret sharing scheme with cheater detection[J]. IECE Trans Inf & Syst, 1996, E79-D(7): 936-942.
  • 8CHOR B, GOLDWASSER S, MICALI S, et al. Verifiable secret sharing and achieving simultaneity inthe presenceof faults[A]. Proceedings of 26^th IEEE Symposium on Foundations of Computer Science[C], Oakland, USA, 1985. 251-160.
  • 9STADLER M. Publicly verifiable secret sharing[A]. Proceedings of EUROCRYPT'96[C]. Zaragoza, Spain. LNCS 1070, Springer-Verlag, Berlin, 1996. 190-199.
  • 10GENNARO R, MICALI S. Verifiable secret sharing as secure computation[A]. Advances in Cryptology- EUROCRYPT'95[C]. St Malo, France, LNCS 921, Springer-Verlag, Berlin, 1995. 168-182.

同被引文献19

  • 1张福泰.基于向量空间接入结构的分布式密钥生成[J].电子学报,2005,33(5):816-819. 被引量:2
  • 2王彩芬,刘军龙,贾爱库,于成尊.具有前向安全性质的秘密共享方案[J].电子与信息学报,2006,28(9):1714-1716. 被引量:4
  • 3PANG Liaojun,LI Huixian,WANG Yumin.An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures[J].Wuhan University Journal of Natural Sciences,2006,11(6):1649-1652. 被引量:2
  • 4Wu Xiaotian,Sun Wei.Random Grid-based Visual Secret Sharing for General Access Structures with Cheat-preventing Ability[J].Journal of Systems and Software,2012,85(5):1119-1134.
  • 5Hu Chunqiang,Liao Xiaofeng,Cheng Xiuzhen.Verifiable Multi-secret Sharing Based on LFSR Sequences[J].Theoretical Computer Science,2012,445:52-62.
  • 6Hsu Ching-Fang,Qi Cheng,Tang Xueming,et al.An Ideal Multi-secret Sharing Scheme Based on MSP[J].Information Sciences,2011,181(7):1403-1409.
  • 7Laih Chi-Sung,Lein Harn,Lee Jau-Yien,et al.Dynamic Threshold Scheme Based on the Definition of Cross-production an N-dimensional Linear Space[C]//Proceedings of Crypto’89.Santa Barbara,USA:Springer-Verlag,1989:20-24.
  • 8Sun H M,Shieh S P.Construction of Dynamic Threshold Schemes[J].Electronics Letters,1994,30(24):2023-2024.
  • 9Hwang Shin-Jia,Chang Chin-Chen.A Dynamic Secret Shar-ing Scheme with Cheater Detection[C]//Proceedings of the 1st Australasian Conference on Information Security and Privacy.London,UK:Springer-Verlag,1996.
  • 10Chor B,Goldwasser S,Micali S.Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults[C]// Proceedings of the 26th IEEE Symposium on Foundations of Computer Science.Portland,USA:[s.n.],1985:251-260.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部