期刊文献+

无可信中心的多秘密共享方案

Multi-secret Sharing Scheme Without a Trusted Party
下载PDF
导出
摘要 现有的多秘密共享方案虽然可以防止可信中心欺骗,但往往计算量较大。针对此问题,基于离散对数求解的困难性,提出无可信中心的多秘密共享方案。该方案不存在可信中心,可以避免可信中心在分发秘密份额时的主动欺骗或无意欺骗。 Most present multi-secret sharing schemes need a lot of computation in order to prevent the trusted party from being cheated.To solve this problem,multi-secret sharing scheme without a trusted party on the basis of the intractability of the discrete logarithm is presented.Because the trusted party does not exist in the proposed scheme,which can prevent the trusted party from being actively or unintentionally cheated,it has good practical application.
出处 《重庆科技学院学报(自然科学版)》 CAS 2011年第4期150-151,166,共3页 Journal of Chongqing University of Science and Technology:Natural Sciences Edition
基金 合肥师范学院院级科研项目(2011kj03) 安徽高校省级自然科学研究项目(KJ2010B162)
关键词 可信中心 多秘密共享 门限方案 离散对数 LAGRANGE插值 trusted party multi-secret sharing threshold scheme discrete logarithm Lagrange interpolation
  • 相关文献

参考文献6

二级参考文献23

  • 1王志伟,谷大武.基于树结构和门限思想的组密钥协商协议[J].软件学报,2004,15(6):924-927. 被引量:11
  • 2许春香,肖国镇.门限多重秘密共享方案[J].电子学报,2004,32(10):1688-1689. 被引量:41
  • 3申一頔,刘焕平.可选子密钥的秘密共享方案[J].哈尔滨师范大学自然科学学报,2006,22(1):54-57. 被引量:4
  • 4Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 5Herzberg A, Jarecki S, Krawczyk H, et al. Proacfive Secret Sharing or: How to Cope with Perpetual Leakage[C]//Proc. of the 15th Annual Int'l Cryptology Conf.. Berlin, Germany: Springer-Verlag, 1995.
  • 6Tzeng W G. A Secure Fault-tolerant Conference-key Agreement Protocol[J]. IEEE Trans. on Computers, 2002, 51(4): 373-379.
  • 7Bresson E, Catalano D. Constant Round Authenticated Group Key Agreement via Distributed Computation[C]//Proc. of Conf. on Public Key Cryptography. Berlin, Germany: Springer-Verlag, 2004.
  • 8Fouque P A, Poupard G Sten J. Sharing Description in the Context of Voting or Lotteries[C]//Proc. of Conf. on Financial Cryptography. Berlin, Germany: Springer-Verlag, 2000.
  • 9SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 10BLAKLEY G R.Safeguarding cryptographic keys[C]// Proceedings AFIPS 1979 National Computer Conference.New York:AFIPS,1979:313-317.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部