期刊文献+

基于访问树的多秘密共享方案

A Muli-secrets Sharing Scheme Based on Access Tree
下载PDF
导出
摘要 该文基于访问树提出了一个多秘密共享方案,弥补了(t,n)门限方案中参与者身份地位必须相同的缺点,使得在秘密分发和恢复时更加灵活。在该方案中参与者的子秘密由每个参与者自己选取,其子秘密的信息可以通过公开的信道发送给秘密分发者,每个参与者只需维护一个子秘密就可以实现对任意多个秘密的共享。分析表明,该方案是一个安全、实用的秘密共享方案。 This paper proposes a multi-secrets sharing scheme based on the access tree, which makes up the weakness of the the participants" position being the same in the (t,n) theshold scheme. The scheme is more flexible when the secrets are distributed and reconstructed. The sub-secrets of participants are chosen by themselves and are submitted to secret dealer through public channel. In the scheme, each participant only maintains one secret but can share several secrets with other participants. Analyses show that this scheme is secure and practical.
作者 王占君 WANG Zhan-jun ( Nantong University, Nantong 226007, China)
机构地区 南通大学理学院
出处 《电脑知识与技术》 2012年第9期6002-6003,6010,共3页 Computer Knowledge and Technology
关键词 多秘密共享 可验证 访问树 异或运算 multi-secret sharing verified access tree XOR operation
  • 相关文献

参考文献5

二级参考文献21

  • 1甘元驹,谢仕义,郑小平,付东洋.对安全有效的(t,n)多秘密共享认证方案的改进[J].电子与信息学报,2007,29(7):1642-1644. 被引量:8
  • 2Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 3Blakley G. Safeguarding Cryptographic Keys[C]//Proc. of AFIPS'79 National Computer Conference. New York, USA: AFIPS Press, 1979.
  • 4Dawson H J, Dawson E. Multisecret-sharing Scheme Based on One-way Function[J]. Electronics Letters, 1995, 3 ! (2): 93-95.
  • 5Ren Junn-Hwang, Chin Chen-Chang. An On-line Secret Sharing Scheme for Multi-secrets[J]. Computer Communications, 1998, 21(13): 1170-1176.
  • 6Chien H, Tseng J. A Practical Multi-secret Sharing Scheme[J]. IEICE Transactions on Fundamentals of Electronics, Comm. and Computer, 2000, 83(12): 2762-2765.
  • 7Yang Chou-Chen, Chang Ting-Yi, Hwang Min-Shiang. A (t,n) Multi-secret Sharing Scheme[J]. Applied Mathematics and Computation, 2004, 151 (2): 483-490.
  • 8Li Huixian, Cheng Chuntian, Pang Liaojun. A New (t,n) Threshold Multi-secret Sharing Scheme[C]//Proc. of 2008 international Symposium on Electronic Commerce and Security. Berlin, Germany: [s. n.], 2005.
  • 9AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al. Wireless sensor networks: a survey [ J]. Computer Networks, 2002,38 (4) :393-422.
  • 10ESTRIN D, GOVINDAN R, HEIDEMANN J, et al. Next century challenges: scalable coordination in sensor networks [ C ]//KODESH H. Proc of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking. New York : ACM Press, 1999:263- 270.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部