期刊文献+

基于签密的可验证向量空间多秘密共享方案 被引量:2

Verifiable vector space multi-secret sharing scheme based on signcryption
下载PDF
导出
摘要 文章针对向量空间秘密共享研究现状,基于Zheng的签密方案、RSA密码学以及Hash函数,提出了一个可验证向量空间多秘密共享方案。在秘密恢复过程中同时实现签名和加密技术,确保方案的安全性;利用影子信息恢复秘密而无需提供子秘密,防止子秘密的泄露;参与者只须存储1个子秘密就可以共享多个秘密,提高了秘密共享方案的效率;基于向量空间存取结构,比传统的门限秘密共享方案更加具有实用价值。 Aiming at the problems of vector space secret sharing, a verifiable vector space multi-secret sharing scheme is presented based on Zheng' s signcryption scheme, RSA cryptography and Hash function. The technology of signature and encryption can be realized simultaneously during the secret reconstruction phase, which ensures the security of the scheme. The shadows are used to recover the secret and the participants do not need to reveal the shares to each other. Multiple secrets can be shared while each participant just needs to save one share, which improves the efficiency of the scheme. Compared with the 'traditional threshold schemes, the presented scheme is more valuable in practical applications.
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2013年第5期555-558,共4页 Journal of Hefei University of Technology:Natural Science
基金 国家自然科学基金资助项目(60971123)
关键词 签密 矢量空间秘密共享 多重秘密共享 影子信息 signcryption vector space secret sharing multi-secret sharing shadow
  • 相关文献

参考文献6

二级参考文献45

共引文献26

同被引文献24

  • 1许春香,肖国镇.门限多重秘密共享方案[J].电子学报,2004,32(10):1688-1689. 被引量:41
  • 2张学军,王育民.高效的基于身份的代理签密[J].计算机工程与应用,2007,43(3):109-111. 被引量:14
  • 3周瑾,张亚娟,祝跃飞.一般的基于身份签名体制与Forking引理[J].信息工程大学学报,2007,8(2):129-133. 被引量:2
  • 4Zheng Yuliang. Digital signcryption or how to achieve cost (signature & encryption) << cost ( signature ) + cost ( encryp- tion) [C]//Proc of CRYPTO' 97. Berlin: Springer-Verlag, 1997:291--312.
  • 5Malone-Lee J. Identity based signcryption. Cryptology ePrintArchive, Report 2002/098 [ C ]//IACR, 2002 : 369--372.
  • 6Li Xiangxue, Chen Kefei. Identity based proxy-signcryption scheme from pairings[C]//Zhang Liangjie, Li Minglu, Amit P S, et al. Proceedings of the IEEE Intemational Conference on Services Computing (SCC 2004). Los Alamitos, Califor- nia: IEEE Computer Society Press, 2004 .. 494--497.
  • 7Wang Meng, Li Hui, Liu Zhijing. Efficient identity based proxy signcryption schemes with forward security and pub- lic verifiability[C]//Lu Xicheng, Zhao Wei. The Third In- ternational Conference on Networking and Mobile Compu- ting ( ICCNMC 2005 ). Berlin: Springer-Verlag, 2005 : 982-- 991.
  • 8Bonehd F M. Identity-based encryption from the Weil pai- ring[C]//Proc of CRYPTO' 01. Berlin: Springer-Verlag, 2001:213--229.
  • 9Chen L, Lee M. Improved identity-based signcryption [C]//Vaudenay S. LNCS, Vol 3386: Public Key Cryptog- raphy-PKC2005. Berlin: Springer-Verlag, 2005 : 362--379.
  • 10SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11):612-613.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部