期刊文献+

可验证的Asmuth-Bloom门限秘密共享方案 被引量:4

The Asmuth-Bloom Verifiable Threshold Sharing Scheme
下载PDF
导出
摘要 将ElGamal体制和Asmuth-Bloom门限秘密共享方案相结合,提出了一个可验证的(t,n)门限秘密共享方案.该方案提出了有效措施来防止秘密份额在分发的过程中被篡改,并且该方案还提供了检验参与者是否提供了正确的秘密份额的方法.而此方案的安全性是基于有限域中解决离散对数问题的困难性. In this paper,a verifiable threshold secret sharing scheme is given,which associate ELGamal system with Asmuth-Bloom threshold secret sharing scheme.The scheme put forward some effective measures to prevent the secret share in the distribution in the process of being tampered with and how to check members if given feigned secret share.Its security is based on diffculty discrete logarithm problem in finite field.
作者 程宇 刘焕平
机构地区 哈尔滨师范大学
出处 《哈尔滨师范大学自然科学学报》 CAS 2011年第3期35-38,共4页 Natural Science Journal of Harbin Normal University
关键词 中国剩余定理 Asmuth-Bloom门限秘密共享方案 ElGamal密码体制 检验欺骗者 Chinese remainder theorem Asmuth-Bloom threshold secret sharing scheme ElGamal cryptosystem Test cheats
  • 相关文献

参考文献7

  • 1Shamir A.How to share a secret[J].Communication of theACM,1979,22(11):612-613.
  • 2Blakley G R.Safeguarding cryptographic key[A].Proceed-ings of AFIPS,1979 National Computer Conference[C].NewYork:AFIPS,1979,48:313-317.
  • 3Asmuth C A,Bloom J.A modular approach to key safeguard-ing[J].IEEE Transactions on Information Theory IT-29,1983.208–210.
  • 4Ore O.,The general Chinese remainder theorem[J].Ameri-can Mathematical Monthly 59,1952:365–370.
  • 5Ding C,Pei D,Salomaa A.Chinese remainder theorem:appli-cations in computing[M].Coding,cryptography.World Sci-entific Publishing,1996.
  • 6Rosen K H.Elementary Number Theory and Its Applications[M].Fourth Edition,Reading,MA:Addison-Wesley,2000.
  • 7阂嗣鹤,严士健.初等数论[M]:第三版.北京:高等教育出版社,2003.

同被引文献28

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部