期刊文献+

安全的多层门限秘密共享方案

Secure Multi-layered Threshold Secret Sharing Scheme
下载PDF
导出
摘要 考虑到多层组织共享秘密,设计了多层门限秘密共享方案。本文方案安全性基于RSA密码体制、Sham ir门限方案以及哈希函数的安全性。方案中,秘密份额由参与者选择和保存,秘密分发者也不知晓。每个参与者只须维护一个秘密份额,可实现对多个秘密的共享。方案不需要安全信道,算法能够保障信息安全传送以及验证真实性。 A multi-layered threshold secret sharing scheme is proposed considering the fact that Secret Sharing among multi-layered organizational structure.The security of the scheme is based on the RSA cryptosystem and Shamir threshold secret sharing scheme and hash function.In the scheme,each participant′s secret shadow is selected and saved by himself and even the secret dealer know nothing about it.Each participant can share many secrets with other participants by holding only one secret shadow.The scheme do not require a secure channel between each participant and the dealer,also algorithm can guarantee secure delivery and verify authenticity of information.
作者 王伟
出处 《广州城市职业学院学报》 2011年第1期91-95,共5页 Journal Of Guangzhou City Polytechnic
基金 国家自然科学基金资助项目"基于无线传感器网络的煤矿瓦斯监测与预测关键技术研究"(51074097)
关键词 秘密共享 门限方案 RSA密码体制 哈希函数 安全信道 secret sharing threshold scheme RSA cryptosystem hash function secure channel
  • 相关文献

参考文献7

二级参考文献15

  • 1庞辽军,王育民.一个基于几何性质的(t,n)多重秘密共享方案[J].西安交通大学学报,2005,39(4):425-428. 被引量:12
  • 2庞辽军,王育民.基于RSA密码体制(t,n)门限秘密共享方案[J].通信学报,2005,26(6):70-73. 被引量:32
  • 3Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 4Blakley G R. Safeguarding Cryptographic Keys[C]//Proceedings of National Computer Conference. Montvale, NJ, USA: AFIPS Press, 1979: 313-317.
  • 5Feldman E A Practical Scheme for Non-interactive Verifiable Secret Sharing[C]//Proc. of the 28th IEEE Symposium on Foundation of ComputEr Science. [S. l.]: IEEE Press, 1987: 427-437.
  • 6Padersen T E Non-interactive and Information-theoretic Secure Verifiable Secret Sharing[C]//Proc. of Advances in Cryptology- CRYPTO'91. NJ, USA: [s. n.], 1992: 129-140.
  • 7Stadler M. Publicly Verifiable Secret Sharing[C]//Proc. of Advances in Cryptology-EUROCRYPTO'96. NJ, USA: [s. n.], 1996: 190-199.
  • 8Schoenmakers B. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting[C]//Proc. of Advances in Cryptology-CRYPTO'99. NJ, USA: [s. n.], 1999: 148-164.
  • 9Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 10Pang Liaojun, Li Huixian, Wang Yumin. A Secure and Efficient Secret Sharing Scheme with Genera/ Access Structures[C]//Proc. of FSKD'06 Berlin, Germany: Springer-Verlag, 2006.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部