期刊文献+

秘密分享方案的一般结构

The General Structure of Secret Sharing Scheme
下载PDF
导出
摘要 通过分析现有的典型秘密分享方案,特别是(t-n)门限秘密分享,指出大部分秘密分享方案都可归结为向量空间中的秘密分享方案,并且这些方案有一个本质的共同点,都蕴含着一个(t×n)矩阵,只要这个矩阵满足任意t列线性无关即可。通过对此类矩阵的分析指出了向量空间中秘密分享方案的一般构造方法。本文给出了此类矩阵的简单构造方法,并利用这样的矩阵构造了一个多秘密分享方案。 After analysising some typical secret sharing schemes, especially the (t-n) threshold secret sharing scheme ,we find that the majority of secret sharing scheme can be attributed to vector space secret sharing scheme, and these schemes have a common feature that all of them contains a matrix of (txn) with any t columns is linearly independent. This paper gives the general method to design secret sharing scheme in vector space through the analysis of the matrix. Then a simple method is proposed to construct the matrix, we design a scheme for multi-secret sharing with such matrix.
作者 赵玉娟
出处 《科技信息》 2011年第11期I0192-I0192,I0420,共2页 Science & Technology Information
关键词 门限秘密分享 向量空间 矩阵 多秘密分享 Threshold secret sharing Vector space Matrix Multi-secret sharing
  • 相关文献

参考文献9

  • 1A.Shamir, How to Share a Secrel, In Communications of the ACM,1979, v.22, no.l1:612-613.
  • 2G.R.Blakley, Safeguarding Cryptographie Keys, Proc. AFIPS 1979 National Computer Conference, New York, NY(June 1979) : 313-317.
  • 3Benaloh J C. Secret Sharing Homomorphisms: Keeping Shares of a Secret[C]. Proc of CRYTO" 86, Berlin:Springer,1986:412-417.
  • 4M.Ito, A.Saito,T Nishizeki, Secret sharing scheme realizing general access structure, Proceedings IEEE Globcom'87_ Tokyo,Japan, 1987:99-102.
  • 5Herzberg,SJareeki,H.Krawcxk,et al,Pmaetive secret sharing cope with Perpetual leakage ,Proc.CRYPT01995 ,LNCS963 : 339-352.
  • 6Chor B, Goldwasser S, Micali S, Awerbuch B. Verifiable secret sharing and achieving simultaneity in the presence of faults, in Proceedings of 26 IEEE symposium on Foundations of computer science,1985:383-395.
  • 7M.Stadler.Publicly verifiable secret sharing, In Advances in Cryptology-EURO. CRYPT'96,volume 1070 of Lecture Notes in Computer Science,Berlin,1996, Springer-Verlag: 190-199.
  • 8Pedersen T P. Non-interactive and information-theoretic secure verifiable secret sharing, in CRYPTO'91, 1991:129-139.
  • 9许春香,陈恺,肖国镇.安全的矢量空间秘密共享方案[J].电子学报,2002,30(5):715-718. 被引量:23

二级参考文献1

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部