期刊文献+

基于部分广播通道的可验证秘密共享方案

Verifiable secret sharing scheme based on partial broadcast channels
下载PDF
导出
摘要 借鉴Amos方案中重构秘密的思想对Rei方案进行了完善,提出一种基于部分广播通道的可验证秘密共享方案。在该方案的秘密分发阶段,秘密分发者与参与者之间使用部分广播通道进行通信,秘密重构阶段使用广播通道进行通信。该方案可处理不诚实秘密分发者与参与者情况,具有可验证性。通过对该方案的分析可知,该方案的通道数和总的通信量比已知的两个方案具有明显的优势。此外,该方案中各参与者的秘密份额可反复使用。 Using the idea of secret recovery in Amos's scheme in reference,a verifiable secret sharing scheme based on partial broadcast channels is proposed.The scheme is an improvement of Rei et al.scheme which can deal with the dishonest dealer and participants.In the secret sharing phase,the dealer and participants use partial broadcast channels to communicate;In the secret recovery phase,participants and combiner use broadcast channels to communicate.Through the analysis of the scheme,we get that it is obviously advantage of the number of channels and the total communications needed compared with the above two schemes.Additionally,in our scheme,the shares of each participant can be used once more.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第9期2127-2128,2292,共3页 Computer Engineering and Design
基金 国家自然科学基金项目(60673041)
关键词 秘密共享 部分广播通道 可验证秘密共享 完备杂凑族 拉格朗日插值 secret sharing partial broadcast channels verifiable secret sharing perfect hash family Lagrange interpolation
  • 相关文献

参考文献6

二级参考文献54

  • 1张小萍,周大水.RSA在DSP下的快速加密实现[J].计算机工程与设计,2004,25(7):1093-1095. 被引量:6
  • 2庞辽军,王育民.基于RSA密码体制(t,n)门限秘密共享方案[J].通信学报,2005,26(6):70-73. 被引量:32
  • 3F Boudot.Efficient Proofs that a Committed Number Lies in an Interval[C].In:Advances in Cryptology-EUROCRYPT'00,2000;431-444
  • 4S Goldwasser,S Micali,C Rackoff.The Knowledge Complexity of Interactive Proof Systems[J].SIAM J Comput, 1989; 18 : 186-208
  • 5S C Kothari.Generalized Linear Threshold Scheme[C].In :Proceeding of CRYPTO'84,1984:231-241
  • 6O Goldreich.Foundations of Cryptography(Basic Tools)[M].Cambridge University Press, 2001
  • 7P Feldman.A Practical Scheme for Non-interactive Verifiable Secret Sharing[C].In:Proceedings of the 28 IEEE Symposium on Foundation of Computer Science(FOCS),IEEE, 1987:427-437
  • 8T P Pedersen.Non-interactive and information-theoretic secure,verifiable secret sharing[C].In:Advances in Cryptology-CRYPTO'91,1992:129-140
  • 9A Shamir.How to Share a Secret[J].Comm ACM,1979;22:612-613
  • 10G R Blakey.Safeguarding Cryptographic Keys[J].Proc NCC, 1979;48:313-317

共引文献57

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部