期刊文献+

参与者有权重的动态多重秘密广义门限方案 被引量:5

Dynamic Generalized Threshold Multi-Secret Sharing Scheme among Weighted Participants
下载PDF
导出
摘要 基于中国剩余定理,提出了一个特殊权限下的参与者有权重的动态多重秘密广义门限共享方案,该方案通过1次秘密共享就可以实现对任意多个秘密的共享.方案中每个参与者的子秘密可以多次使用,共享秘密更新时,无需更新参与者的子秘密,同时,可以灵活地增加或者删除某个参与者. A dynamic generalized threshold multi-secret sharing scheme among weighted participants of special access right based on Chinese remainder theorem is introduced, it permits that multiple secrets be shared in one secret sharing session, The sub-secret of every participant can be used many times, and the secrets can be renewed without renewing the sub-secrets of the participants, furthermore, a participant can be freely put into or removed.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2008年第1期130-134,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家“973计划”项目(2004CB318000) 北京电子科技学院信息安全与保密重点实验室(YZDJ0712)
关键词 特殊权限 门限秘密共享 多重秘密 权重不同 动态 special access right threshold secret sharing multi-secret weighted dynamic
  • 相关文献

参考文献3

二级参考文献21

  • 1[1]G.R Blakey. Safeguarding Cryptographic Keys. Proc. NCC, AFIPS Press, Montvale, 1979,48: 313-317.
  • 2[2]G. R. Blakely and C. Meadows. Security of Ramp Schemes, Crypto'84, Lecture Notes inComputer Sciences 196, pp411-431.
  • 3[3]R. M. Capocelli, A. De Santis, L. Garganos etc. On the Size of Shares for Secret Sharing Schemes[J]. Journal of Cryptology,Vol.6, 1993, 157-167.
  • 4[4]J. Gathen and J. Gerharad, Modern Computer algebra[M]. Cambridge university press, 1999.
  • 5[5]J. He and E. Dawson. Shared Secret Reconstruction, Designs, Codes and Cryptography, 14, 221-237 (1998).
  • 6[6]John D. Lipson. Chinese Remainder and Interpolation algorithm, Proceedings of ACM Symposium on Symbolic and Algebraic Computation[M]. ACM Press, 1971.372-391.
  • 7[7]C. Padro,G. Saez, and J. Villar. Detection of Cheaters in Vector Space Secret Sharing Schemes,Designs,Codes and Cryptography.16, 75-85 (1999).
  • 8[8]A. Shamir. How to share a secret[J]. Communication of ACM, 1979,22: 612-613.
  • 9[9]G. J. Simmons. An introduction to shared secret/or shared control schemes and their applications, Contemporary Cryptology:The science of information integrity. IEEE Press,1992. 441-497.
  • 10[10]D. R. Stinson. Cryptography: Theory and Practice[M]. CRC Press, 1995.

共引文献55

同被引文献31

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部