期刊文献+

一个基于状态树的(t,n)秘密共享方案

A state-tree based(t,n) secret sharing scheme
下载PDF
导出
摘要 在简述已有(t,n)秘密共享方案的基础上,提出了一个直观、简洁有效的基于状态树的(t,n)秘密共享方案,包括设计考虑、算法描述、算法实例,并对该方案进行了分析。分析表明,该方案秘密分割算法具有多项式复杂度,秘密重建算法具有线性复杂度,满足门限机密性和门限可用性。 By introducing and analyzing the existed threshold secret sharing schemes, a visual, concise and efficient state-tree based (t, n) secret sharing scheme was proposed and analyzed, including designing consideration, algorithm description and algorithm instance. It was shown that the secret split algorithm of the scheme polynomial complexity and the secret reconstruction algorithm have hnear complexity. This scheme can provide threshold confidentiality and threshold availability.
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2008年第9期68-72,80,共6页 Journal of Shandong University(Natural Science)
关键词 秘密共享 门限密码系统 状态树 secret sharing threshold cryptosystem state-tree
  • 相关文献

参考文献6

  • 1BLAKLEY G R. Safeguarding cryptographic keys[C]//Merwin R E, Zanca J T, Smith M. Proceedings of the National Computer Conference.NJ: AFIPS Press, 1979:313-317.
  • 2SHAMIR A. How to share a secret [ J ]. Communications of the ACM, 1979, 22 (11) : 612-613.
  • 3ASMUTH C, BLOOM J. A modular approach to key safeguarding[J] :IEEE Transactions on Information Theory, 1983, 29(2) :208-210.
  • 4MALKIN Michael, WU Thomas, BONEH Dan. Building intrusion tolerance applications[ C ] // Proceedings of the DARPA Information Survivability Conference & Exposition: Volume 1. South Carolina: Hilton Head, 2000:74-87.
  • 5ZHOU Lidong. Towards fault-tolerant and secure on-line serviees[D]. Comell: Cornell University, 2001.
  • 6亢保元,王育民.完备秘密共享方案的条件[J].工程数学学报,2004,21(2):222-226. 被引量:1

二级参考文献6

  • 1Blakley G B. Safeguarding cryptographic key[J]. Proceedings of AFIPS 1979 National Computer Conference, 1979 ;48:313 - 317
  • 2Shamir A. How to share a secret[J]. Communications of the ACM,1979;22: (1) :612 - 613
  • 3Ito M, Saito A, Nishizeki T. Secret sharing scheme realizing general access structure[J]. Proc IEEE Global Telecommunication Conf Globecom, 1987; 87: 99 - 102
  • 4Karnin E D, Greene J W, Hellman M E. On secret sharing systems[J]. IEEE on IT, 1983 ;29(1) :231-241
  • 5Brickell E F, Davenport D M. On the classification of ideal secret sharing scheme[J]. J of Cryptology,1991 ;4:123 - 134
  • 6Stinson D R. Cryptography theory and practice[M]. CRC Press, 1995

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部