期刊文献+

一种有效的多重秘密共享方案

An efficient multi-secret sharing scheme
下载PDF
导出
摘要 文章提出了一般接入结构上的多重秘密共享方案。该方案可以动态地添加或删除参与者,动态地更新多重秘密;理论分析表明该方案满足秘密共享的安全性要求,是计算安全的;而实验结果证实该方案操作简单,非常有效;另外,为了防止分发者与参与者的欺诈,提出了可验证的方案;在可验证方案中,基于离散对数问题,各参与者可以检验属于自己份额的共享的正确性。 This paper proposes a multi-secret sharing scheme in common access structure. The scheme can dynamically add or delete the participants and dynamically renew multiple secrets. The theoretic analysis shows that the scheme can guarantee the security of the secret sharing and it is computational- ly secure,and the experiment results prove that it is very easy and efficient to realize it. Furthermore, to detect cheating and identify the cheater, a scheme, the respective participants receiving verified scheme is presented accordingly. In the verified the shares can verify their validity based on the discrete logarithm problem (DLP).
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2008年第5期701-704,共4页 Journal of Hefei University of Technology:Natural Science
基金 国家自然科学基金资助项目(60773114) 安徽省自然科学基金资助项目(070412051) 安徽高校省级重点自然科学研究项目(KJ2007A043)
关键词 多重秘密共享 接入结构 可验证方案 离散对数 multi-secret sharing access structure verified scheme discrete logarithm
  • 相关文献

参考文献12

  • 1Shamir A. How to share a secret [J]. Communications of the ACM, 1979, 22 (11): 612-613.
  • 2Blakley G R. Safeguarding cryptographic keys [C]//Proc of the 1979 AFIPS National Computer Conference. New York:AFIPS Press, 1979: 313-317.
  • 3Ito M, Saito A, Nishizcki T. Secret sharing scheme realizing general access structure [C]//Proc of IEEE Global Telecommunication Conference,1987: 99-102.
  • 4Benaloh J C, Leichter J. Generalized secret sharing and monotone functions [C]//Advances in Cryptology-CRYP- TO'88,LNCS 403, 1990: 27-35.
  • 5He J, Dawson E. Multistage secret sharing based on oneway function [J]. Electronics Letters, 1994, 30 (19): 1591-1592.
  • 6He J, Dawson E. Multisecret-sharing scheme based on oneway function [J]. Electronics Letters, 1995, 31 (2): 93-95.
  • 7Chien H Y, Jan J K, Tseng Y M. A practical (t,n) multisecret sharing scheme [J]. IEICE Transactions on Fundamentals, 2000, E83-A (12): 2762-2765.
  • 8Yang C C, Chang T Y, Hwang M S. A (t,n) multi-secret sharing scheme [J]. Applied Mathematics and Computation, 2004, 151 (2): 483-490.
  • 9Pang L J, Wang Y M. A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing [J]. Applied Mathematics and Computation, 2005,167 (2): 840-848.
  • 10Li H, Cheng C, Pang L A new (t,n)-threshold multi-secret sharing scheme [C]//CIS 2005, Part II, LNAI 3802. Berlin: Springer-Verlag, 2005: 421-426.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部