期刊文献+

DES加密算法在秘密共享中的应用 被引量:1

The Implementation of DES in Secret Sharing Scheme
下载PDF
导出
摘要 秘密共享思想提出后,经过几十年的发展已经出现了很多不同方案、模型等。本文根据秘密共享的特性提出了一种基于对称密钥系统的秘密共享方案。该方案解决了一些秘密共享现有的问题的,尤其是可验证性。存储在密钥分发者的信息都是加密后的密文,因此,其抗攻击的强度就是使用的加密算法的强度。通过简单C++程序实现这一方案。对方案的可行性进行分析。 It has been decades since the idea of secret sharing first introduced . Various kinds of schemes and models have been put forward based on the idea through the development of the decades. In this paper, introduce a new scheme based on the symmetric cryptosystem according to the characters of the idea. This scheme solved some exiting problems of the idea, especially verifiability. The data stored in the server is encrypted, so that, the intensity of invulnerability is based on the intensity of the cryptosystem. A simple C++ program is made for the implementation of the scheme. Analyze the feasibility of the scheme.
出处 《信息网络安全》 2011年第3期60-62,共3页 Netinfo Security
关键词 秘密共享 方案 对称加密系统 程序实现 secret sharing scheme symmetric cryptosystem program implementation
  • 相关文献

参考文献4

  • 1SHAMIR A. How to share a secret[J]. Communications ofthe ACM, 1979, 22(11): 612-613.
  • 2尹学渊.DES加密解密工具2.1及其代码[EB/OL]http://www.cnblogs.com/erwin/archive/2009/04/14/1435288html,2009.
  • 3卢开澄.计算机密码学(第3版)[M].北京:清华大学出版社,2003.
  • 4Jalal Feghhi, Jalil Feghhi, Peter Willians .Digital Certificates[M]. Canada.1998:51.

共引文献3

同被引文献5

  • 1Mikolajczyk,DK.and C.Schmid.A performance evaluation of local descriptors[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,27(2005),1615-1630.
  • 2J.Chen,S.G.Shan,C.He,G.Y.Zhao,M.Pietikainen,X.L.Chen and W.Gao,WLD.A robust local image descriptor[J].IEEE Trans on Pattern Analysis and Machine Intelligence,9(2010),1705-1720.
  • 3Wang,X.W.,M.Stosslein and K.Wang.Designing knowledge chain networks in China-A proposal for a risk management system using linguistic decision making[J].Technological Forecasting and Social Change 6 (2010),902-915.
  • 4Xue,P.Gong,Jae Hyun Park,Daeyoung Park,Duk Kyung Kim.Radio Resource Management with Proportional Rate Constraint in the Heterogeneous Networks[J].IEEE Transactions on Wireless Communications,IEEE,3(2012),1066-1075.
  • 5姚卓禹,杨庚,祁正华,陈艳俐.基于身份的加密算法在无线传感器网中的实现[J].江苏通信,2011,27(2):41-45. 被引量:1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部