期刊文献+

多重门限密钥共享机制与应用

Research and application of multiple-threshold key sharing
下载PDF
导出
摘要 针对密钥管理机制的需求,将共享密钥,采用Shamir(t,n)门限分解为个密钥份额,对所产生的个密钥份额,再次使用(t,n)门限进行分解,分别形成下一级的密钥份额,以此类推,形成经过多重门限所分解的密钥份额,由此推广了Shamir(t,n)门限密钥共享机制,提出了更一般的多重门限密钥共享机制,并给出了多重门限机制针对招投标系统在各种不同需求下的应用解决方案。 According to key management mechanism, the secret key k is divided into n secret shares, then each ot secret snare may be divided into the other n secret shares by using (t, n) threshold technique again and so on. So a more general multiple-threshold sharing mechanism is proposed. Shamir (t, n) threshold sharing mechanism is extended. According to the proposed mechanism a application to a bidding system under various environments is detailed.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第19期4929-4931,5043,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60461001) 广西自然科学基金项目(0542048)
关键词 秘密共享 多重门限 子秘密 密钥 招投标系统 secret sharing multiple-threshold sub-secret key bidding system
  • 相关文献

参考文献8

  • 1Shamir A.How to share a secret [J]. Communications of ACM, 1979,22(11):612-613.
  • 2Yang C C,Chang T Y, Hwang M S.A (t,n) multi-serect sharing scheme [J]. Applied Mathematics and Computation, 2004,151:483-490.
  • 3Santis A D, Masucci B.New results on non-perfect sharing of multiple secrets[J].The Journal of Systems and Software,2007, 80:216-223.
  • 4Kamin E D,Greene J W, Hellman M E.On secret sharing systems [J]. IEEE Transations on Information Theory,1983,IT-29:35-41.
  • 5Ham L. Group-oriented (t,n) threshold digital signature scheme and digital multisignature[C]. IEE Proc of Comput Digit Tech, 1994,141(5):307-313.
  • 6Gennaro R, Jarecki S, Krawczyk H,et al. Robust threshold DSS [C]. Advances in Cryptoloty-Eurocrypt'96,1996:354-371.
  • 7Rabin T. A simplified approach to thresholds and proactive RSA [C]. Advance in Cryptology-Crypto'98, 1998:89-104.
  • 8Shoup V.Practical threshold signatures [C]. Advances in Cryptology-Eurocrypt'00, LNCS 1807,2000:207-220.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部