期刊文献+

一种基于IBE的(t,n)门限调整方案 被引量:1

A(t,n) Threshold Adjustment Scheme Based on IBE
下载PDF
导出
摘要 Baek提出了一个基于身份的门限秘密共享方案IdThdBm,该方案门限值作为参数在系统初始化时确定,无法灵活改变,难以适应网络环境动态变化的安全需求。针对这个问题,提出了一个基于IBE的(t,n)门限秘密共享方案及其门限调整算法。方案通过IBE公钥算法进行秘密分发,影子秘密通过RSA算法进行验证,可有效避免参与者欺骗,当门限值改变时,只需在原有影子秘密基础上增加相应信息,其安全性基于CDH问题难解性。形式化分析和证明显示,新方案能在保证安全性的基础上灵活调整门限值,与已有方案对比分析,新方案具有计算复杂度和影子秘密复用率等方面优势。 Back proposed a threshold secret sharing scheme based on IBE named IdThdBm, however, the value of threshold is fixed in system's initialization, it is not flexible enough to abapt the security requiement of the communication scope dynamic changing. To .solve this problem, proposed a ( t, n) threshold secret sharing scheme based on IBE and the threshold adjustment algorithm. This scheme distributed the secret based on IBE public key algorithm, the shadow .secret was demonstrated via RSA algorithm to avoid the cheating between participants. When the value of the threshold changed, the corresponding information should be added to the former shadow .secret, the security is based on the CDH problem. The analysis and proof showed that the new scheme not only can adjust the value neatly, but also can insure the security. Compared with the existing scheme, new scheme has some advantages such as the complexity and the rate of reusing the shadow secret and so on.
出处 《计算机技术与发展》 2009年第11期128-131,共4页 Computer Technology and Development
基金 国家自然科学基金项目(60873231) 江苏省高校自然科学基金项目(08KJB520006) 江苏省"六大人才高峰"基金项目(06-E-044)
关键词 门限秘密共享 IBE RSA 拉格朗日插值 threshold secret sharing IBE RSA Lagrange interpolation
  • 相关文献

参考文献9

  • 1Chen H, Ling S, Xing C. Access structures of elliptic secret sharing schemes[J ]. IEEE Transactions on Information Theory,2008,54(2) :850 - 852.
  • 2Chen W, Li H. Modelling threshold secret sharing schemes in ad hoc networks[ J ]. IEEE Computer Society,2008,43( 13 ) : 207 - 214.
  • 3Zhang X, Zhang L, Zhang Q, et al. A secret sharing shuffling scheme based on polynomial [ J ]. Proceedings of the IEEE, 2008,14(3) : 1746 - 1750.
  • 4Chen W,Long I,Bai Y. A new dynamic threshold secret sharing scheme from bilinear maps[J ]. IEEE Computer Society, 2007,28(5) : 19 - 20.
  • 5庞辽军,李慧贤,王育民.动态门限多重秘密共享方案[J].计算机工程,2008,34(15):164-165. 被引量:13
  • 6黄东平,王华勇,黄连生,戴一奇.动态门限秘密共享方案[J].清华大学学报(自然科学版),2006,46(1):102-105. 被引量:21
  • 7Baek J, Zheng Y. Identity - based threshold decryption, Public Key Cryptography [ C ]//Proceedings of PKC'04, LNCS 2947. Berlin: Springer - Verlag, 2004: 262 - 276.
  • 8杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 9Boneh D, Franklin M. Identity- based encryption from the weil pairing [ C]//Advances in Cryptology - CRYPTO2001. [s. l. ] :Springer - Verlag,2001:213 - 229.

二级参考文献32

  • 1庞辽军,王育民.基于RSA密码体制(t,n)门限秘密共享方案[J].通信学报,2005,26(6):70-73. 被引量:32
  • 2Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 3Blakley G R.Safeguarding cryptographic keys[A].Proceedings of National Computer Conference[C].Montvale,NJ:AFIPS Press,1979.313-317.
  • 4Ito M,Saito A,Nishizeki T.Secret sharing scheme realizing general access structure[A].Proceedings IEEE Globecom'87[C].Tokyo,Japan:IEEE Press,1987.99-102.
  • 5Cachin C.On-line secret sharing[A].Proceedings of the 5th IMA Conference on Cryptography and Coding[C].London,UK:Springer-Verlag,1995.190-198.
  • 6Hwang Ren-Junn,Chang Chin-Chen.An on-line secret sharing scheme for multi-secrets[J].Computer Communications,1998,21(13):1170-1176.
  • 7Rivest R L,Shamir A,Adleman L.A method for obtaining digital signatures and public key cryptosystem[J].Communication of ACM,1978,21:120-126.
  • 8Aho A,Hopcroft J,Ullman J.The Design and Analysis of Computer Algorithms[M].Massachusetts,US:Addison-Wesley,1974.
  • 9Liu D,Ning P,Li R.Establishing pairwise keys in distributed sensor networks[J].ACM Transactions on Information and System Security,2005,8(1):41-77.
  • 10Du W,et al.A pairwise key predistribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security,2005,8(2):228-258.

共引文献90

同被引文献12

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2邹娟,贾世杰,曾洁,李晖.无线Ad-Hoc网络密钥分发和认证机制研究[J].大连交通大学学报,2007,28(1):50-53. 被引量:3
  • 3Shamir A. Identity-based cryptosystems and signature schemes [ C ]//Proc of CRYPTO on Advances in Cryptology. Berlin : Springer-Verlag, 1984:47-53.
  • 4Waters B. Efficient Identity-Based Encryption without Random Oracles [ C ]//Advances in Cryptology - Encrypt 2005, Volume 3494 of LNCS. Berlin : Springer- Verlag, 2005 : 114 - 127.
  • 5Barreto P S L M,Kim H Y, Lynn B,et al. Efficient algorithms for pairing-based cryptosystems[C]//Proc of the 22nd Annual International Cryptology Conference on Advances in Cryptology.Berlin:Springer-Verlag,2002:354-368.
  • 6Galbraith S D, Harrison K,Soldera D. Implementing the Tare Pairing[ C]//Proc of the 5th International Symposium on Algorithmic Number Theory, London: Springer - Verlag, 2002 : 324-337.
  • 7Gentry C. Practical Identity'Based Encryption Without Random Oracles[C]//Advances in Cryptology-Encrypt 2006, Volume 4004 of LNCS. Berlin: Springer- Verlag, 2006: 445 - 464.
  • 8Akavia A, Goidwasser S, Vaikuntanathan V. Simultaneous hardcore bits and cryptography against memory attacks[C]// TCC 2009, Volume 5444 of LNCS Berlin: Springer- Verlag, 2009:474-495.
  • 9Naor M, Yung M. Public-key cryptosystems provably secure against chosen ciphertext attacks[C]//Proceedings of the 22nd Annual ACM Symposium on Theory of Computing. Berlin : Springer-Verlag, 1990:427-437.
  • 10Alwen J, Dodis Y, Wichs D. Leakage-resilient public-key cryptography in the bounded-retrieval model [C]//CRYPTO 2009, Volume 5677 of LNCS. Berlin: Spriager-Verlag,2009 : 36-54.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部