期刊文献+

无可信中心的可认证秘密共享协议 被引量:6

下载PDF
导出
摘要 采用双生成元和零知识证明认证,提出一个无可信中心的秘密共享协议。协议由组中成员平等地提供秘密份额的值,协商生成组密钥,在保持组密钥不变的情况下定期对秘密份额进行更新,可有效处理恶意成员,并满足完全前向安全性,具有安全性高、性能好的特点。
出处 《计算机应用》 CSCD 北大核心 2007年第B12期118-120,共3页 journal of Computer Applications
基金 国家自然科学基金(10271040)
  • 相关文献

参考文献6

  • 1SHAMIR A. How to share a secret [ J]. Communications of the ACM, 1979,22(11) : 612 -613.
  • 2BLAKLEY G R. Safeguarding eryptographie keys[ C]//Proceedings of the AFIPS 1979 National Computer Conference. Montvale, NJ, USA: AFIPS Press, 1979,48:313-317.
  • 3HERZBERG A, JARECKI S, KRAWCZYK H, et al. Proactive secret sharing or: how to cope with perpetual leakage[ C]// Proceedings of 15th Annual International Clyptology Conference, LNCS 963. Berlin: Springer-Verlag, 1995:339-352.
  • 4TZENG W G. A secure fault-tolerant conference-key agreement protocol [ J]. IEEE Transactions on Computers, 2002, 51 (4) : 373 - 379.
  • 5CHAUM D , PEDERSEN T P . Wallet databases with observers [ C]// Proceedings of 12th Annual International Cryptology Conference, LNCS 740. Berlin: Springer-Veda.g, 1993:89-105.
  • 6CHAUM D , PEDERSEN T P . Wallet databases with observers [C]// Proceedings of International Conference on the Theory and Application of Cryptographic Techniques( EUROCRYPT'92), LNCS 658. Berlin: Springer-Verlag, 1993:390-407.

同被引文献41

  • 1王志伟,谷大武.基于树结构和门限思想的组密钥协商协议[J].软件学报,2004,15(6):924-927. 被引量:11
  • 2Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 3Herzberg A, Jarecki S, Krawczyk H, et al. Proacfive Secret Sharing or: How to Cope with Perpetual Leakage[C]//Proc. of the 15th Annual Int'l Cryptology Conf.. Berlin, Germany: Springer-Verlag, 1995.
  • 4Tzeng W G. A Secure Fault-tolerant Conference-key Agreement Protocol[J]. IEEE Trans. on Computers, 2002, 51(4): 373-379.
  • 5Bresson E, Catalano D. Constant Round Authenticated Group Key Agreement via Distributed Computation[C]//Proc. of Conf. on Public Key Cryptography. Berlin, Germany: Springer-Verlag, 2004.
  • 6Fouque P A, Poupard G Sten J. Sharing Description in the Context of Voting or Lotteries[C]//Proc. of Conf. on Financial Cryptography. Berlin, Germany: Springer-Verlag, 2000.
  • 7A.Shamir,"Identity-based crypto systems and signature schemes,"in Proc.Crypto-84,Santa Barbara,CA.1984.
  • 8S.Tsujii,T.Itho,and K.Kurosawa.ID-based cryptosystem using discrete logarithm problem.Electron.Lett.Vol.23.1987.
  • 9E.Okamoto and K.Tanaka.Identity-based information security management system for personal computer networks.IEEE J.Select.Areas Commun.,Vol.7.1989.
  • 10J.Hastad.On using RSA with low exponent in a public key network.in Lecture Notes in Computer Science:Advances in Cryptology-CRYPTO'85 Proc.

引证文献6

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部