期刊文献+

基于ECC的可验证多秘密共享方案 被引量:1

Verifiable Multi-secret Sharing Scheme Based on ECC
下载PDF
导出
摘要 在现有方案中,各参与者的子秘密由分发者选取,需要通过安全信道发送给各参与者,在秘密恢复时不具有可验证性。针对该问题,提出一种基于ECC的可验证多秘密共享方案。参与者的子秘密由各参与者自己选取,并且可以多次使用。分发者和参与者间不需要安全信道。在秘密恢复时,可以验证各参与者是否进行欺诈,并且一次可以共享多个秘密。 In existing scheme, the dealer chooses and delivers secret information to every participant, so a secure channel between them is necessary, and in the recovery phase, the scheme can not check whether every participant provides the true information. Aiming at such shortcomings, the paper proposes a verifiable multi-secret sharing scheme based on ECC. Each participant's secret shadow is selected and kept by the participant himself. The shadows do not need to be changed when the shared secret is renewed, and many secrets can be recovered one time. The scheme can check whether each participant provides the true information, so a secure channel between them is unnecessary.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第17期167-168,172,共3页 Computer Engineering
基金 国家自然科学基金资助项目(10571113) 陕西省自然科学基金资助项目(2004A14) 陕西省教育厅科学研究计划基金资助项目(07JK375)
关键词 椭圆曲线 自配对 可验证 elliptic curve self pairing verifiable
  • 相关文献

参考文献11

  • 1Shamir A.How to Share a Secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2Blakley G.Safeguarding Cryptographic Key[C] //Proc.of AFIPS'79.New York,USA:[s.n.] ,1979:313-317.
  • 3Asmuth C,Blakley G.Pooling Splitting and Reconstituting Information to Overcome Total Failture of Some Channels of Communication[C] //Proc.of the Symposium on Security and Privacy.[S.1.] :IEEE Press,1982:156-169.
  • 4Kamin E,Greene J,Hellman M.On Secret Sharing Systems[J].IEEE Transaction on Information Theory,1983,29(1):35-41.
  • 5Chor B,Goldwasser S,Micali S,et al.Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults[C] //Proc.of the 26th IEEE Symposium Foundation of Computer Science.Portland,USA:[s.n.] ,1985:383-395.
  • 6Hankerson D,Menezes A,Vanstones S.Guide to Elliptic Curve Crypotography[M].New York,USA:Springer-Verlag,2004.
  • 7Liu Duo,Huang Dongping,Luo Ping,et al.New Schemes for Sharing Points on an Elliptic Curve[J].Computers and Mathematics with Applications,2008,56(6):1556-1561.
  • 8Lee H S.A Self-paring Map and Its Applications to Cryptography[J].Applied Mathematics and Computation,2004,151(3):671-678.
  • 9He J,Dawson E.Multistage Secret Sharing Based on One-way Function[J].Electronnics Letters,1994,30(19):1591-1592.
  • 10张建中,李文敏.基于LUC密码体制的广义秘密共享方案[J].计算机工程,2008,34(8):162-163. 被引量:7

二级参考文献10

共引文献6

同被引文献9

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部