期刊文献+

DYNAMIC AND VERIFIABLE SECRET SHARING AMONG WEIGHTED PARTICIPANTS 被引量:6

DYNAMIC AND VERIFIABLE SECRET SHARING AMONG WEIGHTED PARTICIPANTS
原文传递
导出
摘要 A secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret. Secret sharing is useful in management of cryptographic keys. Based on identity, we analyze the secret sharing scheme among weighted participants. Then we present a dynamic scheme about secret sharing among weighted participants. At last, we analyze the secret sharing scheme among weighted participants, which can make all weighted participants verifiable and dynamic.
出处 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2007年第4期481-485,共5页 系统科学与复杂性学报(英文版)
基金 The research is supported by Research Funds of Information Security and Secrecy Laboratory of Beijing Electronic Science &: Technology Institute under Grant No. YZDJ0712, partially by National Basic Research Program under Grant No. 2004CB318000, and Beijing Municipal Natural Science Foundation under Grant No. 406:3040.
关键词 Chinese Remainder Theorem DYNAMIC secret sharing verifiable WEIGHTED 孙子剩余定理 积极性 机密极分享 参与者
  • 相关文献

参考文献1

二级参考文献11

  • 1[1]G.R Blakey. Safeguarding Cryptographic Keys. Proc. NCC, AFIPS Press, Montvale, 1979,48: 313-317.
  • 2[2]G. R. Blakely and C. Meadows. Security of Ramp Schemes, Crypto'84, Lecture Notes inComputer Sciences 196, pp411-431.
  • 3[3]R. M. Capocelli, A. De Santis, L. Garganos etc. On the Size of Shares for Secret Sharing Schemes[J]. Journal of Cryptology,Vol.6, 1993, 157-167.
  • 4[4]J. Gathen and J. Gerharad, Modern Computer algebra[M]. Cambridge university press, 1999.
  • 5[5]J. He and E. Dawson. Shared Secret Reconstruction, Designs, Codes and Cryptography, 14, 221-237 (1998).
  • 6[6]John D. Lipson. Chinese Remainder and Interpolation algorithm, Proceedings of ACM Symposium on Symbolic and Algebraic Computation[M]. ACM Press, 1971.372-391.
  • 7[7]C. Padro,G. Saez, and J. Villar. Detection of Cheaters in Vector Space Secret Sharing Schemes,Designs,Codes and Cryptography.16, 75-85 (1999).
  • 8[8]A. Shamir. How to share a secret[J]. Communication of ACM, 1979,22: 612-613.
  • 9[9]G. J. Simmons. An introduction to shared secret/or shared control schemes and their applications, Contemporary Cryptology:The science of information integrity. IEEE Press,1992. 441-497.
  • 10[10]D. R. Stinson. Cryptography: Theory and Practice[M]. CRC Press, 1995.

共引文献19

同被引文献15

  • 1王明生,刘卓军,张艳硕.权重不同参与者之间的秘密共享(英文)[J].北京电子科技学院学报,2005,13(2):1-8. 被引量:20
  • 2于佳,李大兴,范玉玲.基于加法共享的可验证秘密再分发协议[J].计算机研究与发展,2006,43(1):23-27. 被引量:6
  • 3黄东平,王华勇,黄连生,戴一奇.动态门限秘密共享方案[J].清华大学学报(自然科学版),2006,46(1):102-105. 被引量:21
  • 4Adi Shamir.How to share a secret[J].Communications of the ACM.1979(11)
  • 5Lein Harn,Changlu Lin.??Strong ( n ,<ce:hsp sp='0.12'/> t ,<ce:hsp sp='0.12'/> n ) verifiable secret sharing scheme(J)Information Sciences . 2010 (16)
  • 6Lein Harn.??Secure secret reconstruction and multi‐secret sharing schemes with unconditional security(J)Security Comm. Networks . 2014 (3)
  • 7Jun Shao.??Efficient verifiable multi-secret sharing scheme based on hash function(J)Information Sciences . 2014
  • 8Mingchu Li,Shu Ma,Cheng Guo.??A novel weighted threshold secret image sharing scheme<sup>?</sup>(J)Security Comm. Networks . 2015 (17)
  • 9Lein Harn,Ching-Fang Hsu.??Dynamic threshold secret reconstruction and its application to the threshold cryptography(J)Information Processing Letters . 2015 (11)
  • 10张艳硕,刘卓军.参与者有权重的动态多重秘密广义门限方案[J].北京邮电大学学报,2008,31(1):130-134. 被引量:5

引证文献6

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部