期刊文献+

可验证秘密共享方案的设计与分析 被引量:5

Design and analysis of a verifiable secret sharing scheme
下载PDF
导出
摘要 针对现有多秘密共享体制不能预防参与者和秘密分发者之间的相互欺骗攻击问题,提出一种新的可验证的门限多秘密共享体制.该体制的安全性是基于Shamir的秘密共享体制和ECIES加密算法的安全性以及椭圆曲线离散对数问题的求解困难性.参与者的秘密份额由每个参与者自己选取,其秘密份额信息可以通过公开信道发送给秘密分发者;每个参与者的秘密份额可以用于多次秘密共享过程而无须进行更新;能够预防参与者和秘密分发者之间的相互欺骗攻击. As the further expansion of the multiple secret sharing scheme, the multi-secret sharing scheme can share any number of secrets in one sharing session. In order to prevent the secret dealer's and the participant's cheating attacks like those in the existing multi-secret sharing schemes, a new verifiable threshold multi-secret sharing scheme is proposed. Each participant's secret shadow is selected by himself and it can he transmitted to the secret dealer over a public channel The shadow can he used in multiple sharing sessions without the need to be updated. At the same time, it is allowed to check whether each cooperative participant and the secret dealer have taken a legal action or not. The security of the proposed scheme is based on that of Shamir's secret sharing scheme and that of the ECIES cryptosystem, and the difficulty in solving the elliptic curve discrete logarithm.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2008年第1期148-151,共4页 Journal of Xidian University
基金 国家自然科学基金资助(60672112) 陕西省自然科学基金资助(2007F37) 中国博士后科学基金资助(20060401008)
关键词 数据安全 秘密共享 椭圆曲线 data security secret sharing elliptic curve
  • 相关文献

参考文献9

  • 1Shamir A. How to Share a Secret [J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 2庞辽军,詹阳,王育民.基于ECC的门限秘密共享方案及其安全性[J].西安电子科技大学学报,2006,33(4):572-575. 被引量:4
  • 3许春香,牛志华,肖国镇.没有可信机构的矢量空间秘密共享-多重签名方案[J].西安电子科技大学学报,2005,32(2):225-228. 被引量:4
  • 4He J, Dawson E. Multisecret-sharing Scheme Based on One-way Function [J]. Electronics Letters, 1995, 31(2): 93-95.
  • 5Harn L. Efficient Sharing (Broadcasting) of Multiple Secret [J]. IEE Proceedings-Computers and Digital Techniques, 1995, 142(3): 237-240.
  • 6Chien H Y, JAN J K, Tseng Y M. A Practical (t, n) Multi-secret Sharing Scheme [J]. IEICE Trans on Fundamentals, 2000, E83-A(12): 2 762-2 765.
  • 7Yang C C, Chang T Y, Hwang M S. A (t,n) Multi-secret Sharing Scheme [J]. Applied Mathematics and Computation, 2004, 151(2): 483-490.
  • 8Pang L J, Wang Y M. A New (t, n) Multi-secret Sharing Scheme Based on Shamir's Secret Sharing [J]. Applied Mathematics and Computation, 2005, 167(2): 840-848.
  • 9Shao J, Cao Z F. A New Efficient (t, n) Verifiable Multi-secret Sharing (VMSS) Based on YCH Scheme [J]. Applied Mathematics and Computation, 2005, 168(1) : 135-140.

二级参考文献12

  • 1庞辽军,王育民.一个基于几何性质的(t,n)多重秘密共享方案[J].西安交通大学学报,2005,39(4):425-428. 被引量:12
  • 2Gennaro R, Jarecki S, Krawczyk H, et al. Robust Threshold D SS Signature[A]. Advances in Cryptology-Eurocrypto'96, Proceedings[C]. Ber lin-Heidelberg: Springer-Verlag, 1996. 354-371.
  • 3Desmed Y, Frankel Y. Shared Generation of Authenticators an d Signatu res[A]. Advances in Cryptology-Crypto91[C]. New York: Springer-Veralg, 1 991. 457-469.
  • 4Safavi-Naini R, Wang H, Lam K Y. A New Approach to Robust Threshold RSA Signautre Schemes[A]. Information Security and Cryptology-ICISC99[C] . Seoul: Springer, 1999. 184-196.
  • 5Hardjono T, Zheng Y. A Practical Digital Multisignature Scheme Based on Discrete Logarithms[A]. Advances in Cryptology-AUSCRYPTO92[C]. New Yo rk: Springer-Verlag, 1992. 123-132.
  • 6Ohta K, Okamoto T. A Digital Multisignature Scheme Based on the Fiat -Shamir Scheme[A]. Advances in Cryptology-ASIACRYPT91[C]. Fuiyoshida: Sp ringer-Verlag, 1991. 75-79.
  • 7Burmester M, Desmedt , Doi H, et al. A Structured ElGamal-type Mult isignature Scheme[A]. Public Key Cryptography[C]. Victoria: Springer, 2000. 466-483.
  • 8Li Chuanming, Hwang T, Lee N Y, et al. (t,n) Threshold-multisig nature Scheme and Generalized-multisignature Scheme Where Suspected Forgery Imp lies Traceability of Adversarial Shareholders[J]. Cryptologia, 2000, 24(3): 250-268.
  • 9Stinson D R. Cyrptography: Theory and Practice[M]. [s.l.]: CRC P ress, 1995. 343-350.
  • 10Padro C, Sez G. Detection of Cheaters in Vector Space Secret Shar ing Schemes[J]. Designs, Codes and Cryptography, 1999, 16(1): 75-85.

共引文献6

同被引文献27

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部