期刊文献+

一种基于身份私钥的秘密共享方案

ASecret Sharing Scheme of Identity-based Private Key
下载PDF
导出
摘要 基于双线性对的门限密码体制过度依赖双线性对结构,而双线性对计算复杂度较高,严重影响秘密共享方案的效率。为此,提出利用Shamir门限共享方案实现双线性对群元素门限分享的新方案,借助整数秘密共享方案间接地实现基于身份私钥的分配。分析结果表明,该方案仅需2次双线性对计算,为设计高效的基于身份的门限密码体制奠定了基础。 Threshold cryptographic scheme based on bilinear pairings depends too much on the bilinear pairing tool,but the computation of the bilinear pairing is very time-consuming so that the efficiency of secret sharing scheme is affected badly.By using Shamir threshold sharing scheme,this paper proposes a new method which threshold shares in the bilinear group.Its based-identity private key can be shared through the secret sharing scheme for integers.Analysis result shows that the new method needs only two times bilinear pairing computations and can be used to further design efficient identity based threshold cryptographic schemes.
出处 《计算机工程》 CAS CSCD 2012年第23期137-138,142,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60973135) 教育部人文社会科学研究青年基金资助项目(11YJCZH039) 广西大学科研基金资助项目(X081059)
关键词 基于身份的密码体制 门限密码体制 秘密共享 双线性对 基于身份私钥 公钥基础设施 identity-based cryptography threshold cryptography secret sharing bilinear pairing identity-based private key Public Key Infrastructure(PKI)
  • 相关文献

参考文献10

  • 1Shamir A.Identity-based Cryptosystems and SignatureSchemes[C]//Proceedings of CRYPTO’84.Berlin,Germany:Springer,1984.
  • 2张宁,辛向军,肖国镇.利用环上的椭圆曲线实现基于身份的加密体制[J].西安电子科技大学学报,2007,34(2):290-293. 被引量:2
  • 3Boneh D,Franklin M.Identity-based Encryption from the WeilPairing[C]//Proceedings of CRYPTO’01.Berlin,Germany:Springer,2001.
  • 4Desmedt Y.Threshold Cryptography[J].European Transactions onTelecommunications,1994,5(4):35-43.
  • 5周孟创,余昭平.一个无可信中心的动态(t,n)门限密钥共享方案[J].计算机应用研究,2011,28(8):3061-3063. 被引量:5
  • 6Shamir A.How to Share a Secret[J].Communications of the ACM,1979,22(11):612-613.
  • 7Baek J,Zheng Yuliang.Identity based Threshold SignatureScheme from the Bilinear Pairings[C]//Proceedings of International Conference on Information Technology.Washington D.C.,USA:IEEE Computer Society,2004.
  • 8Feldman P.A Practical Scheme for Non interactive VerifiableSecret Sharing[C]//Proceedings of FOCS’87.New York,USA:ACM Press,1987.
  • 9Barreto P S L M,Kim H Y,Lynn B,et al.Efficient Algorithms forPairing Based Cryptosystems[C]//Proceedings of CRYPTO’02.Berlin,Germany:Springer Verlag,2002.
  • 10Koblitz N.Elliptic Curve Cryptosystems[J].Mathematics ofComputation,1987,48(177):203-209.

二级参考文献13

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部