期刊文献+

一种新型匿名门限秘密共享方案 被引量:4

A novel anonymous threshold secret sharing scheme
原文传递
导出
摘要 匿名秘密共享在信息安全领域中有着非常重要的应用,已有的方案因效率低,很难满足实际应用所需。将匿名秘密共享当作一个特定的安全多方计算问题来求解。首先定义并设计若干安全多方计算问题的基础协议,继而提出一个完整的匿名门限秘密共享方案。该方案适宜于任意门限参数,而且真正能够保护参与者的隐私。在秘密恢复时,不需要泄露任何有关参与者身份及共享份额的信息。该方案安全、有效,特别适宜于群组密码中匿名认证或匿名签名等应用。 There are many important applications for anonymous secret sharing in information security fields, but it is difficult for the known anonymous schemes to meet the practical application requirements due to their low efficiencies. Anonymous secret sharing was defined as a special secure multi-party computation problem and further solved by using the technologies of secure multi-party computation. First, several primary protocols about secure multi-party computa- tion problems were designed and then a whole scheme of anonymous threshold secret sharing was proposed. This scheme can be suitable for any threshold parameter and really preserve the participants' privacy, that is, the secret can be reconstructed without knowledge of which participants hold which shares. The proposed scheme is secure and effi- cient, and especially it is adaptable for anonymous authentication and anonymous signature in group cryptographic sys- tems well.
作者 石润华 仲红
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2012年第11期31-39,共9页 Journal of Shandong University(Natural Science)
基金 国家自然科学基金资助项目(61173187 61173188) 安徽省自然科学基金资助项目(11040606M141) 安徽高校省级重点自然科学研究项目(KJ2010A009) 安徽大学211工程项目
关键词 秘密共享 安全多方计算 匿名 认证 签名 secret sharing secure multiparty computation anonymous authentication signature
  • 相关文献

参考文献18

  • 1SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22:612-613.
  • 2BLAKLEY G R. Safeguarding cryptographic keys[ C]//AFIPS Conference Proceedings. New York: [ s. n. ], 1979, 48:313- 317.
  • 3ITO M, SAITO A, NISHIZCKI T. Secret sharing scheme realizing general access structure [ C ]//Proceedings of IEEE Global Telecommunication Conference Globecom. Washington: IEEE Computer Society, 1987:99-102.
  • 4BENALOH J C, LEICHTER J. Generalized secret sharing and monotone functions [ C ]//Proceedings on Advances in Cryptol- ogy (CRYPTO'88). New York: Springer-Verlag New York, Inc, 1990: 27-35.
  • 5BLUNDO C, CRESTI A, SANTIS A D. Fully dynamic secret sharing schemes[ J]. Theoretical Computer Science, 165, 2, 1996,407-440.
  • 6FELDMAN P. A practical scheme for non-interactive verifiable secret sharing[ C ]//Proceedings of the 28th IEEE Symposium on Foundation of Computer Science (FOCS). Washington: IEEE Computer Society, 1987: 427-437.
  • 7PEDERSEN T P. Non-interactive and information-theoretic secure verifiable secret sharing[ C ]//Proceedings of the 11 th An- nual International Cryptology Conference on Advances in Cryptology (CRYPTO' 91 ). London: Springer-Verlag London, 1991 : 129-140.
  • 8STINSON D R, VANSTONE S A. A combinatorial approach to threshold schemes[ C]//Conference on the Theory and Ap- plications of Cryptographic Techniques on Advances in Cryptology ( CRYPTO' 87 ). London : Springer-Verlag, 1988 : 330- 339.
  • 9PHILLIPS S J, PHILLIPS N C. Strongly ideal secret sharing schemes[J]. Journal of Cryptology, 1992, 5(3) :185-191.
  • 10BLUNDO C, STINSON D R. Anonymous secret sharing schemes[J]. Discrete Applied Mathematics, 1997, 77( 1 ) :13-28.

二级参考文献13

共引文献43

同被引文献38

  • 1石艳荣,贺永强.PKI和基于身份加密的比较[J].微计算机信息,2008,24(3):83-84. 被引量:8
  • 2李梦东,杨义先.无可信第三方的离线电子现金匿名性控制[J].电子学报,2005,33(3):456-458. 被引量:13
  • 3罗文俊,李祥.多方安全矩阵乘积协议及应用[J].计算机学报,2005,28(7):1230-1235. 被引量:34
  • 4田子建,王继林,伍云霞.一个动态的可追踪匿名认证方案[J].电子与信息学报,2005,27(11):1737-1740. 被引量:10
  • 5杨斌.IBC和PKI组合应用研究[D].郑州:解放军信息工程大学,2009.
  • 6Feldman P. A Practical Scheme for Non-interactive Verifiable Secret Sharing[C].Proceedings of FOCS' 87. New York, USA:ACM Press, 1987.
  • 7滕日,王首道,林宇,李宏图PKI、IBE、CPK对比分析[J].科技信息(科学教研),2008(18):402-403.
  • 8LYNN B. Authenticated ID-based encryption cryptology[R], ePrint Archive Report 2002/072,2002.
  • 9Feldman P. A Practical Scheme for Non-interactive Verifiable Secret Sharing [C].Proceedings of FOCS' 87. New York, USA:ACM Press, 1987.
  • 10YAO ANDREW C. Protocols for secure computation[C].Proceedings of the 23rd IEEE Symposium on the Foundation of Computer Science (FOCS). Washington: IEEE Computer Society, i982:160-164.

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部