期刊文献+

一种门限秘密共享方案的安全性分析 被引量:1

Cryptanalysis of a Publicly Verifiable Threshold Secret Sharing Scheme
下载PDF
导出
摘要 为了更全面分析前向门限秘密共享方案的安全性,针对石润华等人提出的公开可验证的前向门限秘密共享方案,通过理论分析和实验验证发现该方案存在2个安全漏洞:门限值k不可信;攻击者利用公开的秘密更新算法可破解出秘密值S.同时,针对一般前向门限秘密共享方案给出了新的分析方法.该方法通过扩展前向门限秘密共享方案的完备性和秘密更新算法的单向性,使分析后的方案具有更强的安全性. By means of theoretical analyzing and experimental verifying,two flaws in the public verifiable threshold proactive secret sharing scheme proposed by Shi Runhua,are found.First,the value of threshold k can not be trusted.Second,the attackers can crack the secrets S in terms of public shares update algorithm.At last,new analyzing methods for proactive secret sharing scheme are proposed,which can conduct comprehensive analysis of forward-threshold secret sharing scheme by extending the completeness of proactive secret sharing scheme,and the unidirection of shares updated algorithm.
作者 张兴兰 邵华
出处 《北京工业大学学报》 EI CAS CSCD 北大核心 2010年第4期562-565,共4页 Journal of Beijing University of Technology
基金 国家'九七三'计划资助项目(2007CB311100) 国家'八六三'计划资助项目(2006AA01Z440)
关键词 秘密共享 门限方案 密码学 secret sharing threshold scheme cryptography
  • 相关文献

参考文献9

  • 1CHOR B, GOLDWASSER S, M1CAL S, et al. Verifiable secret sharing and achieving simultaneity in the presence of faults [ C]//Proc of IEEE FOCS'85. New York: IEEE Press, 1985 : 383-395.
  • 2PEDERSEN T P. Non-interactive and information-theoretic secure verifiable secret sharing [C]//Proceeding of the llth Annual International Cryptology Conference. London: Springer-Verlag, 1991, 576: 129-139.
  • 3GENNARO R, RABIN M, RABIN T. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography[ C] //Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing. New York: ACM Press, 1998: 101-111.
  • 4NIKOV V, NIKOVA S. On proactive secret sharing schemes [ M ] //Lecture Notes in Computer Science. Berlin: Springer Verlag, 2004, 3357: 308-325.
  • 5ASAEDA H, RAHMAN M, TOYAMA Y. Structuring proactive secret sharing in mobile ad-hoc networks [ C ]//International Symposium on Wireless Pervasive Computer (ISWPC). Phuket, Thailand: IEEE, 2006: 1-6.
  • 6高照锋,叶延风,庄毅.基于椭圆曲线密码体制的先应式秘密共享方案[J].计算机技术与发展,2007,17(7):131-134. 被引量:1
  • 7HERZBERG A, JARECKI S, KRAWCZYK H. Proactive secret sharing or: how to cope with perpetual leakage [C]// Coppersmith Advances in Cryptology CRYPTO'95. Berlin: Springer Verlag, 1995: 339-352.
  • 8石润华,黄刘生.一种新的门限秘密共享方案[J].合肥工业大学学报(自然科学版),2006,29(2):164-168. 被引量:4
  • 9石润华,仲红,黄刘生.公开可验证的门限秘密共享方案[J].微电子学与计算机,2008,25(1):29-33. 被引量:5

二级参考文献31

  • 1周全,杨华冰,黄继海,赵书文.先验式秘密共享方案及实现[J].情报指挥控制系统与仿真技术,2005,27(3):57-60. 被引量:1
  • 2刘锋,张建中.可公开验证的动态秘密分享机制[J].微电子学与计算机,2005,22(12):104-105. 被引量:2
  • 3石润华,黄刘生.一种新的门限秘密共享方案[J].合肥工业大学学报(自然科学版),2006,29(2):164-168. 被引量:4
  • 4Blakley G R.Safeguarding cryptographic keys[A].Proceeding of AFIPS 1979 National Computer Conference[C].Reston:American Federation of Information Processing Societies,1979.313-317.
  • 5Shamir A.How to share a secret[J].Commun of the ACM,1979,22:612-613.
  • 6Ito M,Saito A,Nishizcki T.Secret sharing scheme realizing general access structure[A].Proceedings of IEEE Globecom'87[C].Tokyo,1987.99-102.
  • 7Benaloh J C,Leichter J.Generalized secret sharing and monotone functions[A].Goldwasser S.Avdances in Cryptology-Crypto' 88,LNCS 403[C].Heidelberg:Springer-Verlag,1990.27-35.
  • 8Herzberg A,Jarecki S,Krawczyk H,et al.Proactive secret sharing or:How to cope with perpetual leakage[A].Coppersmith D.Advances in Cryptology-Crypto'95,the 15th Annual International Cryptology Conference[C].Heidelberg:Springeer-Verlag,1995.457-469.
  • 9Canetti R Gennaro R,Herzberg A,et al.Proactive security:long-term protection against break-ins[J].CryptoBytes,1997,3(1):1-8.
  • 10Jarecki.Proactive secret sharing and public key cryptosystems[D].Cambridge:Department of Electrical Engineering and Computer Science,Massachusetts Institute of Technology,1995.

共引文献7

同被引文献4

  • 1Shamir A. How to share a secret[J].Communications of the ACM,1979,(11):612-613.
  • 2DouglasR.Stinson;冯登国.密码学原理与实践[M]北京:电子工业出版社,2009303-375.
  • 3陈磊;刘洋;邹林达.Java程序设计[M]北京:清华大学出版社,2011.
  • 4乔晓林,张建中.参与者有权重的多等级秘密共享方案[J].计算机工程,2011,37(9):176-177. 被引量:1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部