期刊文献+

访问结构上可公开验证的秘密共享方案 被引量:2

Publicly Verifiable Secret Sharing Scheme on Access Structure
下载PDF
导出
摘要 针对离散对数问题的难解性,利用非交互的零知识证明协议,提出一种访问结构上可公开验证的秘密共享方案,在一次秘密共享过程中可以恢复多个秘密,子秘密份额由参与者自己选择,不需要安全信道,参与者提供的影子可以被任何人检验。分析结果表明,该方案具有安全、易于实现的特点,且适用于一般访问结构上的应用。 This paper proposes a publicly verifiable secret sharing scheme on access structures based on the discrete logarithm problem under non-interactive proof protocol.Multiple secrets can be recovered in a sharing session,and each participant's sub-secret is selected by the participant himself,so a secure channel does not need.Anybody is allowed to check the secret shadows provided by participants.Analysis results show that the scheme not only has the properties of security,but also is carried out easily,and it can be used on access structure.
作者 张建中 李瑞
出处 《计算机工程》 CAS CSCD 北大核心 2011年第7期173-174,180,共3页 Computer Engineering
基金 国家自然科学基金资助项目(10571113) 陕西省自然科学基金资助项目(2009JM8002) 陕西省教育厅科学研究计划自然科学基金资助项目(07JK375 2010JK829)
关键词 多秘密共享 零知识证明 访问结构 可公开验证 multi-secret sharing zero-knowledge proof access structure publicly verifiable
  • 相关文献

参考文献10

  • 1Shamir A.How to Share a Secret[J].Communication of the ACM,1979,22(11):612-613.
  • 2Blakley G R.Safeguarding Cryptographic Keys[C]//Proc.of the National Computer Conference.New York.USA:IEEE Press,1979.
  • 3Chor B,Goldwasser S,Micali S,et al.Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults[C|//Proc.of the 26th IEEE Symposium on Foundations of Computer Science.Washington D.C,USA:IEEE Computer Society,1985.
  • 4Zhao Jianjie,Zhang Jianzhong,Zhao Rong.A Practical Verifiable Multi-secret Sharing Scheme[J].Computer Standards &Interfaces,2007,29(1):138-141.
  • 5李慧贤,蔡皖东,裴庆祺.可验证秘密共享方案的设计与分析[J].西安电子科技大学学报,2008,35(1):148-151. 被引量:5
  • 6贺军,李丽娟,李喜梅.一种新的可验证多秘密共享方案[J].计算机工程,2009,35(9):119-120. 被引量:7
  • 7Stadler M.Publicly Verifiable Secret Sharing[C]//Proc.of Cryptology-EUROCRYPTO'96.Berlin,Germany:Springer Verlag,1996.
  • 8Schoenmakers B.A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting[C]//Proc.of Cryptology-CRYPTO'99.New Jersey,USA:[s.n],1999.
  • 9许春根,杨彦炯.一种有成员加入的公开可验证秘密共享方案[J].南京理工大学学报,2009,33(2):161-164. 被引量:2
  • 10Huang Ren-Junn,Chang Chin-Chen.An On-line Secret Sharing Scheme for Multi-secrets[J],Computer Communications,1998,21(13):1170-1176.

二级参考文献28

共引文献11

同被引文献18

  • 1XIE Qi 1,2, YU Xiu-yuan 3 1.Department of Mathematics, Zhejiang University, Hangzhou 310027, Zhejiang,China,2.School of Information and Engineering, Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China,3.Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China.A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J].Wuhan University Journal of Natural Sciences,2005,10(1):107-110. 被引量:13
  • 2沈忠华,于秀源.一个无可信中心的有向门限签名方案[J].杭州师范学院学报(自然科学版),2006,5(2):95-98. 被引量:2
  • 3郭丽峰,程相国.一个无可信中心的(t,n)门限签名方案的安全性分析[J].计算机学报,2006,29(11):2013-2017. 被引量:14
  • 4ELGAMAL T. A Public Key Cryptosystem and a SignatureScheme Based on Discrete Logarithms[ J] . IEEE Transac-tions on Information Theory ,1985 ,31(4) :469-472.
  • 5DE S M, QUISQUATER J J, VEDDER K. A Signaturewith Shared Verification Scheme [ C ] //Proc. of Advancesin Cryptology _ CRYPTO ’ 89. Berlin, Germany : SpringerVerlag, 1989:253-262.
  • 6DESMEDT Y,FRANKEL Y. Shared Generation of Au-thenticators [C ]//Proc. of Crypto, 97. Berlin, Germany :Springer-Verlag, 1992 : 131-136.
  • 7HARN L. Group-oriented (t,n) Threshold Digital Signa-ture Scheme and Digital Multi-signature [ J ]. IEEE Pro-ceedings of Computers and Digital Tehnique, 1994, 141(5);307-313.
  • 8HSU Chienlung,WU Tzongsun,WU Tzongchen. Groupori-ented Signature Scheme with Distinguished Signing Au-thorities[ J]. Future Generation Computer Systems,2004,20(5) :865-873.
  • 9起佳.可信认证关键技术研究[D].北京:北京交通大学,2008:59-67.
  • 10L. Ham. Grouw-oriented (t,n) threshold digital sig- nature scheme and digital Multi signature[J]. IEEEProceedings of Computers and Digital and Techniques, 1994,141(5) :307-313.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部