期刊文献+

基于Mignotte列的可验证秘密共享方案

Verifiable secret sharing scheme based on the Mignotte sequence
下载PDF
导出
摘要 基于Mignotte门限秘密共享方案和离散对数难解性提出了一种一般接入结构的可验证秘密共享方案,方案可以防止分发者或者参与者的欺诈;虽然增加了验证算法,但方案的计算量并没有很大增加,作为需要验证算法的系统是可以接受的. A verifiable secret sharing scheme, which is based on Mignotte threshold secret sharing scheme and the intractability of the discrete logarithm, is proposed in this paper. The scheme can identify the cheaters no matter if she/he is the dealer or the participant. Through the verification algorithm is added, but the computation quantity doesn't increase obviously, so that the system which needs the verification algorithm can accept.
作者 邹峰
出处 《山东理工大学学报(自然科学版)》 CAS 2008年第2期14-16,共3页 Journal of Shandong University of Technology:Natural Science Edition
关键词 密码学 秘密共享 Mignotte列 可验证性 cryptography secret sharing mignotte sequencel verification
  • 相关文献

参考文献7

  • 1Shamir.How to share a secret[J].Communications of the ACM,1979 22 (11):612-613.
  • 2Blakley G.Safeguarding cryptographic keys[C]//Proc AFIPS 1979 National Computer Conference.New York:AFIPS Press,1979.
  • 3Mignotte M.How to share a secret[J].Lecture Notes in Computer Science,1983,149(2):371-375.
  • 4赵建杰,张建中.一种高效的防欺诈在线秘密分享方案[J].计算机应用研究,2007,24(2):140-141. 被引量:2
  • 5Gennaro R.Theory and practice of verifiable secret sharing[D].Cambridge:Massachusetts Institute of Technology,1996.
  • 6Jaume M,Carles P.Secret sharing schemes on access structures with intersection number equal to one[J].Discrete Applied Mathematics,2006,154(3):552-563.
  • 7Pederson T.Non-interactive and information-theoretic secure verifiable secret sharing[C]//CRYPTO'99,Berlin:Springer-Verlag,1991:129-140.

二级参考文献8

  • 1黄梅娟,张建中.基于离散对数的在线秘密分享方案[J].计算机工程与应用,2005,41(25):127-128. 被引量:2
  • 2Shamir A.How to Share a Secret[J].Communications of the ACM,1979,22(11):612-613.
  • 3Blakley G.Safeguarding Cryptographic Keys[C].New York:Proc.of AFIPS National Computer Conference,1979.313-317.
  • 4Tompa M,Woll H.How to Share a Secret with Cheaters[J].Journal Cryptology,1988,1(2):133-138.
  • 5Chan Yeob Yeun,Bhris J Mitchell.How to Identify all Cheaters in Pinch's Scheme[C].Singspore:JWIS,1998.
  • 6Hwang R J,Chang C C.An On-line Secret Sharing Scheme for Multisecrets[J].Computer Communications,1998,21(13):1170-1176.
  • 7Garey M R,Johnson D S.Computers and Intractability:A Guide to the Theory of NP-Completeness[M].W.H.Freeman and Co.,1979.
  • 8吉文峰,吴秀贤,金晟柱,元东豪.利用杂凑函数的在线秘密分享机制[J].电子学报,2003,31(1):45-47. 被引量:4

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部