期刊文献+

一种新的可验证多秘密共享方案 被引量:7

Verifiable Multi-secret Sharing Scheme
下载PDF
导出
摘要 基于离散对数的难解性,提出一种可验证多秘密共享方案并分析其安全性。该方案通过一次秘密共享过程实现对多个秘密的并行共享,其秘密份额由参与者选取,可以防止分发者的欺诈,无须设计专用验证算法。该方案适用于不具备安全信道的环境。 Based on the intractability of the discrete logarithm, this paper proposes a verifiable multi-secret sharing scheme, and analyzes its security. In this scheme, several secrets can be shared during one secret sharing process simultaneously. Each participant chooses the secret share by himself, and the dealer is impossible to be a cheater. It need not to design special verification algorithm. This scheme is valuable in the environments where the security channels are not available.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第9期119-120,共2页 Computer Engineering
关键词 密码学 秘密共享 可验证 LAGRANGE插值多项式 cryptography secret sharing verifiable Lagrange interpolation polynomial
  • 相关文献

参考文献9

  • 1Shamir A.How to Share a Secret[J].Communicatious of the ACM,1979,22(11):612-613.
  • 2Blakley G Safeguarding Cryptographic Keys[C]//Proc.of AFIPS'79 National Computer Conference.New York,USA:AFIPS Press,1979:313-317.
  • 3TompaM,Woll H.How to Share a Secret with Cheaters[J].Journal of Cryptology,1988.1(2):133-138.
  • 4Chor B,Goldwasser S,Micali S,et al.Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults[C]//Proc.of the 26th IEEE Symp..[S.l.]:IEEE Press,1985:251-260.
  • 5Zhao Jianjie,Zhang Jianzhong,Zhao Rong.A Practical Verifiable Multi-secret Sharing Scheme[J].Computer Standards&Interfaces,2007,29(1):138-141.
  • 6赵建杰,张建中.一种新的可验证的多秘密分享方案[J].计算机工程与应用,2007,43(4):131-133. 被引量:8
  • 7Chien H,Tseng J.A Practical(f,n)Multi-secret Sharing Scheme[J].IEICE Transactions on Fundamentals of Electronics.Comm.and Computer,2000.83-A(12):2762-2765.
  • 8Dawson H J,Dawson E.Multisecret-sharing Scheme Based on One-way Function[J].Electronics Letters,1995,31(2):93-95.
  • 9Yang Chouchen,Chang Tingyi,Hwang Miashiang.A(t,n)Multi-secret Sharing Scheme[J].Applied Mathematics and Computation,2004,151(2):483-490.

二级参考文献13

  • 1Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2Blakley G.Safeguarding cryptographic keys[C]//Proc AFIPS 1979 National Computer Conference.New York:AFIPS Press,1979:313-317.
  • 3Chor B,Goldwasser S,Micali S,et al.Verifiable secret sharing and achieving simultaneity in the presence of faults[C]//Proc 26th IEEE Symp FOCS,1985:251-260.
  • 4Tompa M,Woll H.How to share a secret with cheaters[J].Journal Cryptology,1988(1):133-138.
  • 5Chor B,Goldwasser S,Micali S,et al.Verifiable secret sharing and achieving simultaneity in the presence of faults[C]//Proceedings of the 26^th IEEE Symposiumon the Foundations of Computer Science (FOCS),1985:383-395.
  • 6Asmuth C,Bloom J.A modular approach to key safeguarding[J].IEEE Trans on Information Theory,1983,IT-29(547):208-210.
  • 7Chien H-Y,Tseng J-K.A practical (t,n) multi-secret sharing scheme[J].IEICE Transactions on Fundamentals,2000,83 (12):2762-2765.
  • 8He J,Dawson E.Multistage secret sharing based on one-way function[J].Electronics Letters,1994,30(19):1591-1592.
  • 9He J,Dawson E.Multisecret-sharing scheme based on one-way function[J].Electronics Letters,1995,31 (2):93-95.
  • 10Yang C-C,Chang T-Y,Hwang M-S.A (t,n) multi-secret sharing scheme[J].Appl Math Comput,2004,151:483-490.

共引文献7

同被引文献51

  • 1庞辽军,王育民.基于RSA密码体制(t,n)门限秘密共享方案[J].通信学报,2005,26(6):70-73. 被引量:32
  • 2甘元驹,谢仕义,郑小平,付东洋.对安全有效的(t,n)多秘密共享认证方案的改进[J].电子与信息学报,2007,29(7):1642-1644. 被引量:8
  • 3Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 4Blakley G. Safeguarding Cryptographic Keys[C]//Proc. of AFIPS'79 National Computer Conference. New York, USA: AFIPS Press, 1979.
  • 5Dawson H J, Dawson E. Multisecret-sharing Scheme Based on One-way Function[J]. Electronics Letters, 1995, 3 ! (2): 93-95.
  • 6Ren Junn-Hwang, Chin Chen-Chang. An On-line Secret Sharing Scheme for Multi-secrets[J]. Computer Communications, 1998, 21(13): 1170-1176.
  • 7Chien H, Tseng J. A Practical Multi-secret Sharing Scheme[J]. IEICE Transactions on Fundamentals of Electronics, Comm. and Computer, 2000, 83(12): 2762-2765.
  • 8Yang Chou-Chen, Chang Ting-Yi, Hwang Min-Shiang. A (t,n) Multi-secret Sharing Scheme[J]. Applied Mathematics and Computation, 2004, 151 (2): 483-490.
  • 9Li Huixian, Cheng Chuntian, Pang Liaojun. A New (t,n) Threshold Multi-secret Sharing Scheme[C]//Proc. of 2008 international Symposium on Electronic Commerce and Security. Berlin, Germany: [s. n.], 2005.
  • 10Sham ir A. How to share a secret[J].Communications of the ACM,1979,22(11) :612 -613.

引证文献7

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部