期刊文献+

基于单向散列链的可更新(t,n)门限秘密共享方案 被引量:4

Renewable (t,n) threshold secret sharing scheme based on one-way hash chain
下载PDF
导出
摘要 为了提高可更新秘密共享方案中影子秘密的更新效率,基于单向散列链的特性,提出了一种新型可更新秘密共享方案。该方案使用单向散列链构造更新多项式,避免了生成随机多项式带来的计算开销。秘密共享实现过程基于IBE公钥体制,具有良好的安全性能。影子秘密验证基于有限域上离散对数难解问题,能有效避免参与者欺骗。理论分析和仿真结果显示该方案能在保证安全性的前提下显著提高影子秘密更新的效率。 In order to improve the efficiency of rekeying in renewable secret sharing schemes,on the basis of characteristics of one-way hash chain,a new proactive secret sharing scheme was proposed.In the scheme,the updated polynomial’s coefficients were generated by a one-way hash chain,which can save the computation costs of generating a random polynomial.The process of secret sharing was based on IBE public key algorithm,which has excellent security features.Under the assumption of DL problem in finite fields,the shares verification process can prevent cheating among participants efficiently.Theoretical analysis and simulation results demonstrate the improvement of the performance.
作者 李大伟 杨庚
出处 《通信学报》 EI CSCD 北大核心 2010年第7期128-135,共8页 Journal on Communications
基金 国家自然科学基金资助项目(60873231) 江苏省高校自然科学基金资助项目(08KJB520006) 江苏省"六大人才高峰"基金资助项目(06-E-044)~~
关键词 秘密共享 单向散列链 身份加密算法 secret sharing one-way hash chain IBE
  • 相关文献

参考文献15

  • 1HARN L,LIN C L.Detection and identification of cheaters in (t,n) secret sharing scheme[J].Designs Codes and Cryptography,2009,52(1):15-24.
  • 2HERZBERG A,JARECKI S,KRAWCZYK H,et al.Proactive secret sharing or:how to cope with perpetual leakage[A].Coppersmith Ded Advances in Cryptology CRYPTO'95[C].Berlin:Springer Verlag,1995.339-352.
  • 3TANG C M,WU D O,CHRONOPOULOS A T,et al.Efficient multi-party digital signature using adaptive secret sharing for low-power devices in wireless networks[J].IEEE Transactions on Wireless Communications,2009,8(2):882-889.
  • 4QIU Gang,WANG Hong,XIAO Hong,XIAO Guozhen.Improvement on Tzeng-Tzeng's Robust Forward-Secure Signature Schemes with Proactive Security[J].Chinese Journal of Electronics,2009,18(1):155-158. 被引量:1
  • 5YANG J P,RHEE K H,SAKURAI K.A proactive secret sharing for server assisted threshold signatures[A].2nd International Conference on High Performance Computing and Communications (HPCC2006)[C].Munich Germany,Berlin:Springer,2006.250-259.
  • 6许春香,魏仕民,肖国镇.定期更新防欺诈的秘密共享方案[J].计算机学报,2002,25(6):657-660. 被引量:27
  • 7WANG S J,TSAI Y R,CHEN P Y.Proactive (k,n) threshold secret sharing scheme with variant k and n[A].IEEE-PROCEEDINGS,2007 International Conference on Intelligent Pervasive Computing[C].Jeju Island Korea,2007.117-120.
  • 8SUN H,ZHENG X,YU Y.A proactive secret sharing scheme based on elliptic curve cryptography[A].Education Technology and Computer Science[C].2009.ETCS '09.First International Workshop,Wuhan China,2009.666 -669.
  • 9张瑞山,陈克非.An efficient proactive RSA scheme for large-scale ad hoc networks[J].Journal of Shanghai University(English Edition),2007,11(1):64-67. 被引量:1
  • 10LI F,SHANG J W,LI D X.A proactive secure multi-secret sharing threshold scheme[A].The 8th ACIS International Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing(SNPD2007)[C].Qingdao,China,2007.105-110.

二级参考文献26

  • 1Schneier B 吴世忠(译).应用密码学[M].北京:机械工业出版社,2000..
  • 2Liu D,Ning P,Li R.Establishing pairwise keys in distributed sensor networks[J].ACM Transactions on Information and System Security,2005,8(1):41-77.
  • 3Du W,et al.A pairwise key predistribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security,2005,8(2):228-258.
  • 4Anderson R,Kuhn M.Tamper resistance-a cautionary note[A].Proceedings of the 2nd Usenix Workshop on Electronic Commerce[C].Washington DC,USA:ACM Press,1996.1-11.
  • 5Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks[A].Proceedings of the 9th ACM Conference on Computer and Communications Security[C].Washington DC,USA:ACM Press,2002.41-47.
  • 6Pietro R D,Mancini L V,Andmei A.Random key assignment for secure wireless sensor networks[A].ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03)[C].Washington DC,USA:ACM Press,2003.62-71.
  • 7Chan H,et al.Random key predistribution schemes for sensor networks[A].IEEE symposium on Research in Security and Privacy[C].New York:IEEE publishing,2003.197-213.
  • 8Gura N,et al.Elliptic curve cryptography and RSA on 8-bit CPUs[A].Proceedings of the Workshop on Cryptography Hardware and Embedded Systems(CHES 2004)[C].Berlin:Springer-Verlag,2004.11-13.
  • 9Liu D,Ning P.Multi-level μTESLA:broadcast authentication for distributed sensor networks[J].ACM Transactions in Embedded Computing Systems (TECS),2004,3(4):800-836.
  • 10Shamir A.Identity-based cryptography and signature schemes[A].Advances in Cryptology,CRYPTO'84,Lecture Notes in Computer Science[C].Berlin:Springer-Verlag,1985,196:47-53.

共引文献85

同被引文献42

  • 1刘蓬涛,李大兴.基于Lagrange插值多项式的门限方案的实现[J].计算机工程与应用,2005,41(36):117-119. 被引量:5
  • 2SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 3BLAKLEY G R. Safeguarding cryptographic keys[A]. Managing Requirements Knowledge, International Workshop[C]. IEEE Com- puter Society, 1979.313-313.
  • 4CHOR B, GOLDWASSER S, MICALI S, et al. Verifiable secret shar- ing and achieving simultaneity in the presence of faults[A]. 2013 IEEE 54th Atmual Symposium on Foundations of Computer Science[C]. 1985. 383-395.
  • 5KAYA K, SEL(UK A A. A verifiable secret sharing scheme based on the Chinese remainder theorem[A]. Progress in Cryptology- IN- DOCRYPT 2008[C]. Springer Berlin Heidelberg, 2008. 414-425.
  • 6LU Q, XIONG Y, HUANG W, et aL A distributed ECC-DSS authenti- cation scheme based on CRT-VSS and trusted computing in MANET[A]. Trust, Security and Privacy in Computing and Commu- nications (TrustCom), 2012 IEEE l lth International Conference[C]. 2012.656-665.
  • 7KAYA K, SELCUK A A. A verifiable secret sharing scheme based on the chinese remainder theorem[A]. Progress in Cryptology-INDOCRYPT 2008[C]. Springer Berlin Heidelberg, 2008.414-425.
  • 8HARN L, FUYOU M, CHANG C C. Verifiable secret sharing based on the Chinese remainder theorem[J]. Security and Communication Networks, 2014, 7(6): 950-957.
  • 9ZHANG L, GUO F, LIU S, et al. A verifiable multi-secret sharing scheme based on LUC cryptosystem[A]. Consumer Electronics, Communications and Networks (CECNet), 2011 International Con- ference on IEEE[C]. 2011.2905-2908.
  • 10HU C, LIAO X, CHENG X. Verifiable multi-secret sharing based on LFSR sequences[J]. Theoretical Computer Science, 2012, 445: 52-62.

引证文献4

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部