期刊文献+

先动的可公开验证服务器辅助秘密共享 被引量:7

Proactive and Publicly Verifiable Server-Assisted Secret Sharing
下载PDF
导出
摘要 如何保护密钥的安全性是一个重要的安全问题.为了应对这个问题,提出了一个先动的可公开验证服务器辅助秘密共享方案,方案中秘密可公开验证的共享在用户和一组服务器中,秘密重构是用户驱动的.另一个重要特点是方案具有双向发起的先动属性,即用户和服务器的份额在每个时间周期都进行更新,每次的更新操作是用户和服务器双方发起的。使方案十分公平。并使敌手更难危及密钥的安全性. How to protect the security of secret keys is an important problem of security. A proactive and publicly verifiable server-assisted secret sharing scheme is proposed. The secret in this scheme is publicly verifiably shared between a user and a group of servers, and the secret reconstruction is activated by the user. Another important trait of the scheme is that it has two-side initial proactive property, that is, the shares of the user and servers will be renewed in each time period and the renewal operation is initiated by the cooperation of the user and servers. This will make the scheme very fair and make it difficult for an adversary to compromise the secret.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2008年第5期13-17,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(60703089) 国家“863计划”项目(2006AA012110;2004AA001260)
关键词 先动秘密共享 可公开验证秘密共享 服务器辅助密码 proactive secret sharing publicly verifiable secret sharing server-assisted cryptosystem
  • 相关文献

参考文献9

  • 1Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 2Blakley G R. Safeguarding cryptographic keys [ C] // AFIPS 1979 National Computer Conference. New York: AFIPS, 1979.. 313-317.
  • 3戴元军,马春光,杨义先.一种改进的基于拉格朗日插值的(t,n)门限秘密共享[J].北京邮电大学学报,2004,27(2):24-28. 被引量:7
  • 4张劼,刘振华,温巧燕.欺骗免疫秘密共享[J].北京邮电大学学报,2005,28(4):83-86. 被引量:6
  • 5郭奋卓,高飞,温巧燕,朱甫臣.一个基于Bell态的高效量子秘密共享协议[J].北京邮电大学学报,2005,28(6):120-122. 被引量:4
  • 6Feldman P. A pratical scheme for non-interactive verifiable secret sharing[C]//28th Annual FOCS. New York: IEEE; Press, 1987: 427-437.
  • 7Stadler M. Public verifiable secrel sharing[C]//Cryptology-EUROCRYPT'96. Berlin: Springer- Verlag, 1996: 190-199.
  • 8Herzberg A, Jarecki S, Krawczyk H, et al. Proactive secret sharing, or: how to cope with perpetual leakage[C] // Crytptolgy-Crypto ' 95. [ S. l. ] : Springer-Verlag, 1995 : 339-352.
  • 9Yang J, Rhee K, Sakurai K. A proactive secret sharing for server assisted threshold signatures[ C]//HPCC 2006. Berlin: Springer-Verlag, 2006: 250-259.

二级参考文献23

  • 1高飞,温巧燕.一种量子密钥分发和身份认证协议[J].北京邮电大学学报,2004,27(3):98-102. 被引量:10
  • 2温巧燕,高飞,朱甫臣.量子密钥分发中身份认证问题的研究现状及方向[J].北京邮电大学学报,2004,27(5):1-6. 被引量:11
  • 3Zhang Jie, Chang Zuling, Wen Qiaoyan. Further results of cheating immune secret sharing I J]. The Journal of China Universities of Posts and Communications, 2004,11(4): 26-28.
  • 4Pieprzyk J, Zhang X M. Cheating prevention in secret sharing over GF ( p' ) [ A ]. INDOCRYPT 2001 [ C ].2001. 79-90.
  • 5Stinson D R. Cryptography: theory and practice [ M].CRC Press, 1995.
  • 6Zhang X M, Zheng Y L. Cryptographically resilient functions[J]. IEEE Trans Inform Theory, 1997, 43:1740-1747.
  • 7Zhang X M, Pieprzyk J. Cheating immune secret sharing[A]. The Third International Conference on Information and Communication Security(ICICS) 2001 [ C]. 2001.144-149.
  • 8Pieprzyk J, Zhang X M. Constructions of cheating immune secret sharing[A]. Lecture Notes in Computer Science[C]. 2001. 226-243.
  • 9Hsu Li-Yi.Quantum secret-sharing protocol based on G-rover's algorithm [J].Phys Rev A,2003,68:022306.
  • 10Karlsson A,Koashi M,Imoto N.Quantum entanglement for secret sharing and secret splitting [J].Phys Rev A,1999,59:162.

共引文献14

同被引文献36

引证文献7

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部