期刊文献+

整体检测门限秘密共享欺诈者方案

Scheme of Whole Detecting Cheaters in Threshold Secret Sharing
下载PDF
导出
摘要 对门限秘密共享欺诈者的检测,目前很少有整体检测法。利用线性方程组解的性质,在能获得比门限个数多一个参与者的条件下,不需其他任何信息,只需执行一次运算,就可整体判断有无欺诈者。该方案是一个完备的秘密共享方案,信息率为1,1个欺诈者欺诈成功的概率为0,2个及多个欺诈者欺诈成功的概率不超过1/p(p为大素数)。 So far, methods of whole detecting cheaters in threshold secret sharing are few. If another participant can join in the t participants, t+1 participants in total, according to the scheme proposed in this paper, the existence of cheaters can be checked out only calculating equations once, requiring no other information. This scheme is a perfect sharing scheme. Its information rate is 1. The probability of one cheater's success is 0 and it is less than l/p (where p is a large prime) for two or three cheaters in probability of success.
作者 张毅 陈文星
出处 《计算机工程》 CAS CSCD 北大核心 2009年第12期123-124,共2页 Computer Engineering
基金 重庆市科委自然科学基金资助项目(2007BB2389)
关键词 门限秘密共享 欺诈 整体检测 秘密影子 多方安全 threshold secret sharing cheat whole detecting shadow of secret multi-party security
  • 相关文献

参考文献9

  • 1Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 2Blakley G R. Safeguarding Cryptographic Keys[C]//Proc. of the National Computer Conference. [S. 1.]: American Federation of Information Processing Societies, 1979:313-317.
  • 3Li Chuan-ming, Hwang Tzonelih, Lee Narn-Yih, et al. (t,n) Threshold-multisignature Scheme Where Suspected Forgery Implies Traceability of Adversarial Shareholders[J]. Cryptologial, 2000, 24(3): 250-268.
  • 4Rifa-Coma J. How to Avoid the Cheaters Succeeding in the Key Sharing Scheme[J]. Designs, Codes and Cryptography, 1993, 3(3): 221-228.
  • 5Bao Feng, Deng R H. A Signcryption Scheme with Signature Directly Verifiable by Public Key[C]//Lecture Notes in Computer Science. [S.l.]: IEEE Press, 1998: 55-99.
  • 6陈伟东,冯登国,谭作文.指定验证方的门限验证签名方案及安全性证明[J].软件学报,2005,16(11):1967-1974. 被引量:8
  • 7Yuan J, Ding C. Secret Sharing Schemes from Three Classes of Linear Codes[J]. IEEE Transactions on Information Theory, 2006, 52(1): 206-212.
  • 8Brickell E F, Stinson D R. The Detection of Cheaters in Threshold Schemes[J]. SIAM Journal of Discrete Mathematics, 1991, 4(4): 502-510.
  • 9Cappentieri M. A Perfect Threshold Secret Sharing Scheme to Identifty Cheaters[J]. Designs, Codes and Cryptography, 1995, 5(3): 183-187.

二级参考文献9

  • 1Laih C, Yen SM. Multisignature for specifical group of verifier. Journal of Information Science and Engineering, 1996,12(1):143-152.
  • 2He WH. Weakness in some multisignaure schemes for specified group of verifiers. Information Procesing Letters, 2002,83(2):95-99.
  • 3Goh EJ, Jarecki S. A signature scheme as secure as the Diffio-Hellman problem. In: Biham E, ed. Advances in Cryptology-EUROCRYPT 2003. LNCS 2656, Berlin: Springer-Verlag Publishers, 2003. 401-415.
  • 4Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In:Proc. of the 1 st ACM Conf.on Computer and Communicatuions Security. New York: ACM Press, 1993.62-73.
  • 5Micali S, Ohta K, Reyzin L. Accountable-Subgroup multisignatures. In: Sander T, ed. Proc. of the 8th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2001. 245--254.
  • 6Raimondo MD, Gennaro R. Provably secure threshold password-Authenticared key exchange. In: Biham E, ed. Advances in Cryptology-EUROCRYPT 2003. LNCS 2656, Berlin: Springer-Verlag, 2003. 507-523.
  • 7伍前红 王继林 王育民 见:陈克非 李祥 编.基于离散对数公钥的t-out-of-n环签字[A].见:陈克非,李祥,编.密码学进展-ChinaCrypt2004[C].北京:科学出版社,2004.209-214.
  • 8Canetti R, Gennaro R, Jarecki S, Krawczyk H, Rabin T. Adaptive security for threshold cryptosystems. In: Wiener M, ed.Advancesin Cryptology-CRYPT'99. LNCS 1666, Berlin: Springer-Verlag, 1999.98-115.
  • 9Goldreich O. Foundations of Cryptography: Basic Tools. Beijing: Publishing House of Electronics Industry, 2003.35-107.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部