期刊文献+

可公开验证的短份额秘密共享算法 被引量:1

Public verifiable algorithm of threshold secret sharing with short share
下载PDF
导出
摘要 为弥补传统秘密共享方案秘密长度不能太长的缺点,同时又能防止参与者作弊,利用Jordan矩阵理论,结合拉格朗日插值公式,提出了一种可验证的短份额门限秘密共享算法。算法能有效抵抗统计攻击和任意少于r个腐败的分享者的合谋攻击;各分享者保存的份额很短。当秘密是一个大的隐私文件、在一个不可信链路上传输的大消息、几个分享者共享的一个秘密数据库或者分布式存储的海量数据时,都具有重要的应用。 To make up the limitation that the length of secret can not be too long and prevent the action of cheating, using the theory of Jordan matrix, and combining with the formulary of Lagrange, the authors put forward an algorithm of threshold secret sharing with short share. It could effectively resist the statistical attack and the united attack of corrupt participants less than r. The length of secret share that each participator needed to conserve was very short. It had a very important application when the secret was a big privacy file, a big message transmitted in an insecure channel, a secret database shared by several participants or enormous data in distributed storage.
出处 《计算机应用》 CSCD 北大核心 2009年第9期2363-2365,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(60842006) 武警部队军事应用科研项目(wjk2009020)
关键词 秘密共享 可验证 门限方案 Jordan矩阵 secret sharing verifiable threshold scheme Jordan matrix
  • 相关文献

参考文献3

二级参考文献12

  • 1BLAKLEY GR.Safeguarding cryptographic keys[A].Proceedings of the 1979 AFIPS National Computer Conference[C].AFIPS Press,1979,Vol 48:313 -317.
  • 2SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(1):612 -613.
  • 3ITO M,SAITO A,NISHIZCKI T.Secret sharing scheme realizing general access structure[A].Proceedings of IEEE Global Telecommunication Conference Globecom[C].1987,Vol 87:99-102.
  • 4BENALOH JC,LEICHTER J.Generalized secret sharing and monotone functions[A].Advances in Cryptology-CRYPTO'88[C].1990,LNCS 403:27 -35.
  • 5CHOR B,GOLDWASSER S,MICALI S,et al.Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults[A].Proceedings of IEEE FOCS'85[C].1985.383-395.
  • 6GOLDREICH O,MICALI S,WIGDERSON A.How to play any mental game[A].Proceeding of the Nineteenth annual ACM Symp[C].Theory of Computing,1987.218-229.
  • 7BEN-OR M,GOLDWASSER S,WIGDERSON A.Completeness theorems for non-cryptographic fault-tolerant distributed computation[A].ACM STOC[C].1988.1 -10.
  • 8RABIN T,BEN-OR M.Verifiable Secret Sharing and Multiparty Protocols with Honest Majority[A].ACM STOC[C].1989.73-85.
  • 9FELDMAN P.A Practical Scheme for Non-interactive Verifiable Secret Sharing[A].Proceedings of the 28 IEEE Symposium on Foundation of Computer Science(FOCS)[C].IEEE,1987.427-437.
  • 10PEDERSEN TP.Non-interactive and information-theoretic secure verifiable secret sharing[A].Advances in Cryptology-CRYPTO'91[C].Berlin:Springer,1991.129-140.

共引文献6

同被引文献5

  • 1石润华,黄刘生.一种简单的可验证秘密共享方案[J].计算机应用,2006,26(8):1821-1823. 被引量:7
  • 2Rabin M O. Efficient dispersal of information for security, load balancing, and fault tolerance [ J ]. Journal of the ACM (JACM). 1989, 36(2) : 335 -348.
  • 3Shamir A. How to share a secret [ J ]. Communications of the ACM. 1979, 22 (11 ) : 612 -613.
  • 4Pedersen T P. Non -interactive and information -theoretic secure verifiable secret sharing [ C ]. Advances in Cryptology - CRYPTO91. Springer - Verlag, 1991 : 129 - 140.
  • 5Krawczyk H. Secret Sharing Made Short[ C]. Advances in Cryptology - CRYPT093. Springer- Verlag, 1993:136 -146.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部