期刊文献+

基于离散对数问题可验证的多秘密共享方案 被引量:2

Verifiable threshold multi-secret sharing scheme based on discrete logarithm problem
下载PDF
导出
摘要 传统的秘密共享方案不能验证参与者或秘密分发者的欺骗行为,Lin-Wu等人提出的秘密共享方案虽可实现欺骗行为的验证,但需要很大的计算量,方案中的秘密分存必须通过计算得到,不能满足秘密分存选取的随机性,并且方案需要在秘密分发者与每个参与者之间建立安全信道,增加了方案实现的负担。因此,提出改进的秘密共享方案,方案中参与者无需验证秘密分发者的欺骗行为,减少了各参与者的计算量;秘密分存由参与者自己选择,实现了秘密分存选取的随机性,并且方案中无需建立安全信道。除此之外,方案能够以最小的计算量检验参与者之间的欺骗,并能实现多重秘密共享以及新的秘密和新的参与者的加入。 The traditional secret sharing scheme cannot verify the fraud of participants or secret distributors. The secret sharing scheme proposed by Lin-Wu et al. can verify these frauds, which requires a lot of computation. The secret shares in this scheme must be calculated which can not meet the randomness of shares. It needs to establish secure channels between the secret distributor and each participant, which increases the burden of the implementation of the scheme. Therefore, an improved secret sharing scheme was proposed in the paper. Participants do not need to verify fraud by the secret distributor, which reduces the calculation of participants. The secret shares are chosed by the participants, which achieves the randomness of secret shares. In addition, the scheme can share multi-secret sharing and update the group secrets. It also can dynamically add new participants.
出处 《计算机工程与科学》 CSCD 北大核心 2013年第5期41-45,共5页 Computer Engineering & Science
基金 信息安全国家重点实验室开放基金资助项目(02-04-4) 江苏省创新计划项目资助项目(CXZZ11_0295)
关键词 多秘密共享 离散对数问题 门限体制 multi-secrets sharing discrete logarithm problem threshold scheme
  • 相关文献

参考文献2

二级参考文献26

  • 1刘锋,张建中.可公开验证的秘密分享机制[J].兰州大学学报(自然科学版),2006,42(2):65-67. 被引量:9
  • 2SHAMIR A.Hoe to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 3HE J,DAWSON E.Multistage secret sharing based on one-way function[J].Electronics Letters,1994,30(19):1591-1592.
  • 4JACKSON W A,MARTIN K M,O'KEEFE C M.On sharing many secrets[C]//Proc of Advances in Cryptology-ASIACRYPT'94.Berlin:Springer-Verlag,1994:42-54.
  • 5STADLER M.Publicly verifiable secret sharing[C]//Proc of Advances in Cryptology-EUROCRYPY'96.Berlin:Springer-Verlag,1996:190-199.
  • 6TOMPA M,WOLL H.How to share a secret with cheaters[J].Journal of Cryptology,1988,1:133-138.
  • 7HARN L.Efficient sharing (broadcasting) of multiple secret[J].IEE Proc Comput Digit Tech,1995,142(2):237-240.
  • 8AOLLEMAN L,McCURLEY K.Open problems in number theoretic complexity[J].Lecture Notes of Compute Science,1994,877:291-322.
  • 9CHANG T Y,HWANG M S,YANG W P.An improvement on the Liu-Wu(t,n) threshold verifiable multi-secret sharing scheme[J].Applied Mathematics and Computation,2005,163:169-178.
  • 10NAOR D,NAOR M,LOTSPIECH J B.Revocation and tracing schemes for stateless receivers[C]//Proc of Advances in Cryptology-CRYPTO'01.Berlin:Springer-Verlag,2001:41-62.

共引文献14

同被引文献14

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部