期刊文献+

基于ECC的无可信中心的(t,n)门限秘密共享方案 被引量:5

(t,n) threshold secret sharing scheme without SDC based on ECC
下载PDF
导出
摘要 利用椭圆曲线离散对数问题(ECDLP),设计了一个无可信中心(SDC)的(t,n)门限秘密共享方案。系统的初始化、组成员的私钥、公钥的产生都不需要SDC的参与,利用各成员之间的秘密共享值,构造了秘密共享矩阵,结合Lagrange插值定理,实现了(t,n)门限秘密共享。分析表明,该方案具有较高的安全性和一定的实用价值。 By means of Ellipse Curve Discrete Logarithm Problem(ECDLP),a (t,n) threshold secret sharing scheme based on ellipse curve cryptography is proposed in this paper.Systemic initialization,the private key and the public key are produced without SDC,the secret sharing matrix is built by the secret sharing value of each member's.At last a (t,n) threshold secret sharing scheme is realized by the matrix and Lagrange interpolation theorem.The scheme is security in theory and is suitable for the practice.
作者 符茂胜 罗斌
出处 《计算机工程与应用》 CSCD 北大核心 2008年第32期85-86,92,共3页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60772122) 安徽省教育厅自然科学研究重点项目(No.KJ2007A072) 安徽省教育厅自然科学研究项目(No.KJ2007B376ZC)。
关键词 椭圆曲线 秘密共享 门限方案 可信中心 Elliptic Curve Cryptography(ECC) secret sharing threshold scheme trusted Share Distribution Center(SDC)
  • 相关文献

参考文献8

  • 1Desmedt Y.Some recent research aspects of threshold cryptography[C]// Lecture Notes in Computer Scienee:Proe of the 1st Int'l Information Security Workshop.New York:Spring-Verlag, 1997:158-173.
  • 2Shamir A.How to share a secret[J].Communications of the ACM, 1979,22( 11 ):612-613.
  • 3Blakley G.Safeguarding cryptographic keys[C]//Proc AFIPS 1979 Natl Conf.New York:AFIPS Press,1979:313-317.
  • 4Asmuth C,Bloom J.A modular approach to key safeguarding[J]. IEEE Transactions on Information Theory, 1983,29 : 208-210.
  • 5Karnin E D,Greene J W,Hellman M E.On secret sharing systems[J]. IEEE Transactions on Information Theory, 1983,29( 1 ):231-241.
  • 6Chang T Y,Yang C C,Hwang M S.A threshold signature scheme for group communications without a shared distribution center[J]. Future Generation Computer Systems, 2004,20 ( 6 ) : 1013-1021.
  • 7周福才,林龙,王金营,徐剑.没有SDC的(t,n)门限秘密共享方案[J].通信学报,2006,27(10):69-73. 被引量:2
  • 8庞辽军,詹阳,王育民.基于ECC的门限秘密共享方案及其安全性[J].西安电子科技大学学报,2006,33(4):572-575. 被引量:4

二级参考文献3

共引文献4

同被引文献50

  • 1于丹,刘焕平.自选子密钥的(t,n)门限方案[J].哈尔滨师范大学自然科学学报,2007,23(1):53-55. 被引量:1
  • 2陈碧琴,熊桂武.组合恒等式的两种新证法[J].沈阳师范大学学报(自然科学版),2004,22(3):169-171. 被引量:2
  • 3郭现峰,袁丁.一个基于SAS思想的防欺诈的秘密共享方案[J].四川师范大学学报(自然科学版),2005,28(5):627-630. 被引量:2
  • 4Blakley G R.Safeguarding cryptographic keys[C]//Proc AFIPS 1979, National Computer Conference.New York, USA:AFIPS Press, 1979.
  • 5Shamir A.How to share a secret[J].Communieations of the ACM, 1979,22( 11 ) :612-613.
  • 6Okada K,Kurosawa K.MDS secret sharing scheme secure against cheaters[J].IEEE Transactions on Information Theory,2000,46(3): 1078-1081.
  • 7Rabin T,Ben-Or M.Verifiable secrets sharing and multiparty protocols with honest majority[C]//Johnson D S.Proceedings of the 21st Annual ACM Symposium on Theory of Computing.New York:ACM Press, 1989: 73-85.
  • 8Yang Chouchen,Chang Tingyi,Hwang Minshiang.A (t,n) multi-secret sharing scheme[J].Applied Mathematics and Computation,2004, 151(2):483-490.
  • 9He J,Dawson E.Muhi-secret sharing scheme based on one-way function[J].Electronics Letters, 1995,31 (2) : 93-95.
  • 10Zhao Jianjie,Zhang Jianzhong,Zhao Rong.A practical verifiable multi-secret sharing seheme[J].Computer Standards & Interfaces, 2007,29( 1 ) : 138-141.

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部