期刊文献+

一种动态的密钥分存方案 被引量:2

A dynamic secret key sharing scheme
下载PDF
导出
摘要 基于Shamir秘密共享,提出一种动态的密钥分存方案.该方案中,密钥被拆分为n份,分别交由n个代理秘密保存;其中任意大于或等于t个代理协作可以重构密钥,而任意少于t个代理却不能.另外,在密钥分发者不再持有密钥的前提下,能够动态更新共享、动态增加或删除参与者及动态增加门限值.保证了系统的扩展性、健壮性,从而提高系统的安全性.因而,有着很好的应用前景. This paper proposed a dynamic secret key sharing scheme based on Shamir's secret sharing,which allowed a dealer owning a secret key to split this secret key among a group of n agents in such a way that any t agents could reconstruct the secret key,but less than t agents couldn't do the same thing.In addition,under the conditions that the dealer didn't hold the secret key any longer,it could dynamically renew the shares,joined or deleted the participant,and increased the threshold value.It kept the extensibility and robustness of the sharing system,and then enhanced its security.Thus,there were many potential applications.
出处 《安徽大学学报(自然科学版)》 CAS 北大核心 2010年第3期38-42,共5页 Journal of Anhui University(Natural Science Edition)
基金 安徽省教育厅重点科研基金资助项目(KJ2010A009)
关键词 门限 动态 秘密分享 密钥 密码学 threshold dynamic secret sharing secret key cryptography
  • 相关文献

参考文献10

  • 1Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2Blakley G.Safeguarding cryptographic keys[C].Proc of the 1979 AFIPS National Computer Conference,AFIPS Press,1979,48:313-317.
  • 3Blundo C,Cresti A,Santis A D,et al.Fully dynamic secret sharing schemes[C].In CRYPTO'93.Berlin,Germany:Springer-Verlag,1993,773:110-125.
  • 4Li Mingyan,Poovendran R.Disenroll-ment with perfect forward secrecy in threshold schemes[J].IEEE Transactions on Information Theory,2006,52(4):1676-1682.
  • 5Wyglinski A M,Labeau F,Kabal P.An efficient bit allocation algorithm for multicarrier modulation[C].WCNC 2004,Atlanta:GA,2004:1194-1199.
  • 6Martin K,Safavi N R,Wang H.Bounds and techniques for efficient redistribution of secret shares to new access structures[J].Comp J,1999,42(8):638-649.
  • 7Martin K,Pieprezyk J,Safavi N R,et al.Changing thresholds in the absence of secure channels[J].Australian Comp J,1999,31(2):34-43.
  • 8Barwick S,Jachson W,Martin K.Updating the parameters of a threshold scheme by minimal broadcast[J].IEEE Trans Inf Theory,2005,51(2):620-633.
  • 9Feldman P.A practical scheme for non-interactive verifiable secret sharing[C].Proceedings of the 28 IEEE Symposium on Foundation of Computer Science (FOCS),IEEE,1987:427-437.
  • 10Pedersen T P.Non-interactive and information-theoretic secure verifiable secret sharing[C].Advances in Cryptology-CRYPTO'91,Berlin:Springer,1991:129-140.

同被引文献12

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部