期刊文献+

一种动态(t,n)门限多重秘密共享方案 被引量:6

New dynamic threshold multi-secret sharing scheme
下载PDF
导出
摘要 针对现有的门限秘密共享方案在处理参与者集合动态变化时灵活性差和许多多重秘密共享方案不能一次恢复出多个秘密(需要进行很多轮的计算)这两个缺点,提出了一个新的方案,给出了一个简单实用的La-grange插值的方法。该方案可以动态添加或删除参与者,无须重新分发子秘密,参与者的子秘密由自己选取和保存,可以在不安全的环境中传送;同时公开的只是子秘密的影子,子秘密可以重复再用,在秘密的恢复阶段可以一次恢复多个秘密。 Known threshold secret sharing schemes have limited flexibility when dealing with the dynamic joining and leaving of the participants. Many multiple secret sharing schemes can' t recover all the secrets in one time. Proposed a new dynamic muhi-secret sharing scheme and developed an easy utility method to solve the Lagrange interpolation . It was efficient for the scheme to solve the participants join or leave dynamically, without redistributing the subsecrets, and the subsecrets were kept secretly by the participants themselves. And it was the shadows of the subsecrets that were published. The subsecrets could be used repeatedly, and all the secrets could be recovered in one time.
出处 《计算机应用研究》 CSCD 北大核心 2008年第2期516-517,520,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(10571113) 陕西省自然科学基金研究计划项目(2004A114)
关键词 秘密共享 多重 动态 拉格朗日插值多项式 安全性 secret sharing multiple dynamic Lagrange interpolation security
  • 相关文献

参考文献12

  • 1SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979, 22(11) : 612-613.
  • 2BLAKLEY G R. Safeguarding cryptographic keys [ C ]//Proc of the National Computer Conference. New York: AFIPS Press, 1979: 313- 317.
  • 3黄东平,王华勇,黄连生,戴一奇.动态门限秘密共享方案[J].清华大学学报(自然科学版),2006,46(1):102-105. 被引量:21
  • 4PANG Liao-jun, WANG Yu-min. A new ( t, n) multi-secret sharing scheme based on Shamir' s secret sharing[ J]. Applied Mathematics and Computation, 2005,167: 840- 848.
  • 5HARN L. Efficient sharing (broadcasting) of multiple secret [ J]. IEEE Proc Comput Digit Tech, 1995,142 (3) :237- 240.
  • 6HE J, DAWSON E. Multistage secret sharing based on one-way function [J]. Etectron Lett,1994, 30(19) : 1591-1592.
  • 7许春香,肖国镇.门限多重秘密共享方案[J].电子学报,2004,32(10):1688-1689. 被引量:41
  • 8刘锋,张建中.一类新型的门限分享方案的设计与分析[J].计算机应用研究,2006,23(1):96-97. 被引量:1
  • 9刘锋,张建中.一个完善的可公开验证秘密分享方案[J].计算机应用研究,2006,23(5):96-97. 被引量:2
  • 10CHOR B, GOLDWASSER S, MICAH S, et al. Verifiable secret sharing and achieving simultaneity in the presence of faults[ C]//Proc of the 26th IEEE Symposium on the Foundations of Computer Science (FOCS). New York: IEEE Press, 1985 : 383-395.

二级参考文献26

  • 1Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2Blakley G R.Safeguarding cryptographic keys[A].Proceedings of National Computer Conference[C].Montvale,NJ:AFIPS Press,1979.313-317.
  • 3Ito M,Saito A,Nishizeki T.Secret sharing scheme realizing general access structure[A].Proceedings IEEE Globecom'87[C].Tokyo,Japan:IEEE Press,1987.99-102.
  • 4Cachin C.On-line secret sharing[A].Proceedings of the 5th IMA Conference on Cryptography and Coding[C].London,UK:Springer-Verlag,1995.190-198.
  • 5Hwang Ren-Junn,Chang Chin-Chen.An on-line secret sharing scheme for multi-secrets[J].Computer Communications,1998,21(13):1170-1176.
  • 6Rivest R L,Shamir A,Adleman L.A method for obtaining digital signatures and public key cryptosystem[J].Communication of ACM,1978,21:120-126.
  • 7Aho A,Hopcroft J,Ullman J.The Design and Analysis of Computer Algorithms[M].Massachusetts,US:Addison-Wesley,1974.
  • 8A Shamir.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 9H.-Y.Lin,Harn L.A generalized secret sharing scheme with cheater detection[A].Advances in Cryptology-ASIACRYPT'91 Proceedings[C],Berlin:Springer-Verlag,1993.149-158.
  • 10M Carpentieri.A perfect threshold secret sharing scheme to identify cheaters[J].Designs,Codes and Cryptography,1995,5(3):183-197.

共引文献61

同被引文献42

引证文献6

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部