期刊文献+

具有长时安全性的高性能异或秘密共享协议的研究 被引量:2

Research on high-performance XOR secret sharing protocols with long-term security
原文传递
导出
摘要 用于长数据分散存储的秘密共享协议面临着2方面问题,其一为长时安全性问题——份额在长期存储过程中可能渐次泄露,其二为份额分解与重构时的性能问题.已有秘密共享协议无法同时解决上述2个问题,鉴于此,选取Kurihara等的异或秘密共享(XORSS)协议和拜占庭协商协议为基础协议,设计了2个具有长时安全性的增强型异或秘密共享协议——用于份额更新的主动异或秘密共享(PXORSS)协议和用于门限提升的动态门限异或秘密共享(DTXORSS)协议.PXORSS协议和DTXORSS协议基于异或运算进行实现,延续了XORSS协议的高效性,此外给出了数学证明和过程分析,表明2协议满足长时安全性;设计了基于MapReduce模式的云存储原型系统,实验结果表明2协议性能较高、在长数据分散存储方面实用性较强. Secret sharing protocols for decentralized storage of long - data face two problems. The first one is long term security threatening--shares may leak during the period of long - term storage. The second one is per- formance degrading when constructing shares and reconstructing secret. Traditional secret sharing shcemes cannot solve both of the two problems at the same time. For this reason,we chose XOR Secret Sharing(XORSS) proposed by Kurihara et al. and Byzantine Agreement Protocol as the underlying protocols, then designed protocol two long -term security enhanced XOR Secret Sharing protocols--Proactive XOR Secret Sharing(PXORSS) protocol for share updating and Dynamic Threshold XOR Secret Sharing (DTXORSS) protocol for threshold increasing. PX- ORSS protocol and DTXORSS protocol are designed based on XOR operations, and both of the two protocols ex- tend the high - performance of XORSS protocol. Mathematical proof and procedure analysis show that the above two protocols can meet the requirement of long - term security ; furthermore, prototyping cloud storage system u- sing MapReduce paradigm illustrates that PXORSS protocol and DTXORSS protocol designed by this paper are high - performance and practical for decentralized storage of long - data.
作者 陆正福 晁巍
出处 《云南大学学报(自然科学版)》 CAS CSCD 北大核心 2014年第3期321-328,共8页 Journal of Yunnan University(Natural Sciences Edition)
基金 国家自然科学基金(10861012) 云南省教育厅科学研究基金(09Y0347) 云南大学理(工)科校级科研资助(2011YB27) 云南大学中青年骨干教师培养计划专项(XT412003)
关键词 秘密共享 异或 主动安全 动态门限 长时安全 MAPREDUCE secretty MapReducesharing XOR( Exclusive OR) proactive security dynamic threshold long - term securi-
  • 相关文献

参考文献18

  • 1SHAMIR A. How to share a secret[ J]. Communications of the ACM, 1979:612-613.
  • 2BLAKLEY G R. Safeguarding cryptographic keys [ C ]//Proceedings of the National Computer Conference, New York, 1979 : 313-317.
  • 3杨春尧,陆正福,李军.UC安全的动态群组密钥协商协议设计与分析[J].通信技术,2014,47(1):81-85. 被引量:1
  • 4陆正福,杜飞.基于安全多播的大规模VSS协议优化[J].云南大学学报(自然科学版),2012,34(5):514-520. 被引量:2
  • 5YAO A C. Protocols for secure computation [ C ]//Proceeding of 23rd Annual IEEE Symposium on the Foundation of Computer Science, 1982 : 160-164.
  • 6KURIHARA J, KIYOMOTO S, FUKUSHIMA K, et al. A new ( k, n) - threshold secret sharing scheme and its extension [ C ].Proceedings of the 1 l th International Conference on Information Security, ISC 2008 ,Taipei ,Taiwan,2008:455-470.
  • 7FELDMAN P. A practical scheme for non -interactive verifiable secret sharing [ C ]//28th Annual Symposium on Foundations of Computer Science Los Sngeles, USA, 1987:427-438.
  • 8PEDERSEN T P. Non -interactive and information -theoretic secure verifiable secret sharing[ C ]//Lecture Notes in Comput- er Science, 1992,129-140. Doi : 10. 100713 - 540 - 46766 - 1_9.
  • 9HERZBERG A, JARECKI S, KRAWCZYK H, et al. Proactive secret sharing or:How to cope with perpetual leakage [ C ]/ Proceedings of the 15th Annum International Cryptology Conference on Advances in Cryptology, 1995:339-352.
  • 10SCHULTZ D A,LLSKOV B,LISKOV M. Mobile proactive secret sharing[ C]//Proceedings of the Twenty- seventh ACM Symposium on Principles of Distributed Computing,2008:458490.

二级参考文献24

共引文献1

同被引文献13

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部