期刊文献+

一种基于身份加密的可验证秘密共享方案 被引量:11

An ID Based Verifiable Secret Sharing Scheme
下载PDF
导出
摘要 提出了一种使用IBE公钥算法实现的可验证秘密共享方案.该方案中秘密分发者将IBE私钥作为共享秘密在接入结构中分发,任何参与者可以通过公开的验证信息验证影子秘密的正确性.随后在随机预言模型中证明了所提方案的语义安全性.理论分析和仿真实验表明,方案可以有效检测来自内外部攻击者的欺骗攻击,并具有较低的时间复杂度和通信开销. A verifiable secret sharing scheme based IBE is proposed.In the scheme,the shared secret is the private key which extracted by IBE algorithm and every participator can verify the shares conveniently by the public information.A formal proof of semantic security of the scheme is provided in the random oracle model.The theoretical analysis indicates that the scheme can detect cheatings from both inside and outside attacker.The simulation results demonstrate that the proposed scheme has remarkable performance in both computation and communication cost.
出处 《电子学报》 EI CAS CSCD 北大核心 2010年第9期2059-2065,共7页 Acta Electronica Sinica
基金 国家自然科学基金(No.60873231) 国家973研究发展规划项目(No.2011CB302903) 江苏省高校自然科学基金(No.08KJB520006) 江苏省"六大人才高峰"基金(No.06-E-044)
关键词 可验证 秘密共享 基于身份加密 verifiable secret sharing identity based encryption(IBE)
  • 相关文献

参考文献17

  • 1Chor B,Goldwasser S,Micali S,et al.Verifiable secret sharing and achieving simultaneity in the presence of faults[A].Proceedings of 26 IEEE Symposiums on Foundations of Computer Science[C].Washington:IEEE Computer Society,1985.383-395.
  • 2Stadler M.Publicly verifiable secret sharing[A].Advances in Cryptology-EURO-CRYPT' 96[C].Berlin:Springer-Verlag,1996.32-46.
  • 3Fujisaki E,Okamoto T.A practical and provably secure scheme for publicly verifiable secret sharing and its applications[A].Advances in Cryptology-EUROCRYPT ' 98[C].Berlin:Springer-Verlag,1998.32-46.
  • 4Schoenmakers B.A simple publicly verifiable secret sharing scheme and its application to electronic voting[A].Advances in Cryptology-Crypto' 99 Proceedings[C].Berlin:Springer-Verlag,1999.148-164.
  • 5Hou Z F,Han J H,Hu D H.A new authentication scheme based on verifiable secret sharing[A].2008 International Conference on Computer Science and Software Engineering[C].Wuhan,China:IEEE Computer Society,2008.1028-1030.
  • 6Tian Y L,Peng C G,Zhang R P,et al.A practical publicly verifiable secret sharing scheme based on bilinear pairing[A].2nd International Conference on Anti-counterfeiting,Security and Identification,2008(ASID2008)[C].Guiyang,China:IEEE,2008.71-75.
  • 7Liu F,Gao D M.On the design of divisible PVSS-based electronic cash schemes[A].IEEE International Symposium on Knowledge Acquisition and Modeling Workshop(KAM Workshop 2008)[C].Wuhan China:IEEE,2008.112-115.
  • 8Yu J,Kong F Y,Hao R.Publicly verifiable secret sharing with enrollment ability[A].8th ACIS International Conference on Software Engineering,Artificial Intelligence,Networking,and Parallel/Distributed Computing,2007(SNPD 2007)[C].Qingdao,China:IEEE Computer Society,2007.194-199.
  • 9Wang F,Gu L,Zheng S,et al.A novel verifiable dynamic multi-policy secret sharing scheme[A].The 12th International Conference on Advanced Communication Technology(ICACT2010)[C].Paris France:IEEE,2010.1474-1479.
  • 10Tartary C,Pieprzyk J.Wang H X.Verifiable multi-secret sharing schemes for multiple threshold access structures[A].Information Security and Cryptology 2007[C].Berlin:Pringer-Verlag Heidelberg,2008.167-181.

二级参考文献29

  • 1庞辽军,王育民.一个基于几何性质的(t,n)多重秘密共享方案[J].西安交通大学学报,2005,39(4):425-428. 被引量:12
  • 2庞辽军,王育民.基于RSA密码体制(t,n)门限秘密共享方案[J].通信学报,2005,26(6):70-73. 被引量:31
  • 3SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979, 24(11):612-613.
  • 4BLAKLEY G Safeguarding cryptographic key[A]. Proc of AFIPS 1979 Nalional Computer Conference[C]. New York, USA, 1979.313-317.
  • 5ANIL K. JAI N. Biometric recognition[J]. Nature, 2007,449(6): 38-40.
  • 6JEFFERS J, ARAKALA A. Minutiae-based structures for a fuzzy vault[A]. Proc of the 2006 IEEE Biometrics Symposium[C]. MD, USA, 2006. 760-769.
  • 7ASMUTH C, BLOOM J. A modular approach to key safeguarding[J]. IEEE Transactions on Information Theory, 1983, 29: 208-210.
  • 8KARNIN E D, GREENE J W, HELLMAN M E. On sharing secret systems[J]. IEEE Transactions on Information Theory, 1983, 29: 35-41.
  • 9BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[J]. SIAM, J Comput, 2003, 32(3): 586-615.
  • 10杨波.现代秘密学(第二版)[M].北京:清华大学出版社,2007.

共引文献78

同被引文献96

引证文献11

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部