期刊文献+

基于环Z_n上的圆锥曲线的多秘密共享方案 被引量:1

Multi-Secret Sharing Scheme Based on Conic Carve over Zn
下载PDF
导出
摘要 密钥共享技术是密钥管理中的关键技术之一,针对基于有限群上计算离散对数的难度和单向函数求逆的难题,提出了一种基于环Z_n上的圆锥曲线公钥密码体系的多秘密共享方案,利用上述方案,可在系统成员中可以方便、安全、有效地共享多重密钥;根据需要,系统可以定期更新共享的秘密,具有动态安全性;可以根据秘密的不同等级动态地调整其恢复时的门限值,可以高效地检测秘密管理者与分享者的欺作行为,对共享者进行身份认证,验证子密钥的正确性。 Secret sharing technology is one of critical technologies about key management. An efficient multilevel -secret sharing scheme was designed on the public-key cryptography of conic curve over Zn. The scheme made comprehensively use of difficulties in computing discrete logarithm and the intractability of reversing the one-way Hash function. In the scheme, participants can share multiple secrets and compute sub-secret for rebuilding efficiently and securely. As for the multi- secret of the different grade, the multi- secret distributer can dynamically adjust the threshold value ; cheating of the dealer or any participant can he detected efficiently; identity authentication of participant can be provided; and the shadows of key can be validated.
作者 闫鸿滨
出处 《计算机仿真》 CSCD 北大核心 2014年第5期171-174,共4页 Computer Simulation
基金 国家自然科学基金项目(60773035) 四川省学术和技术带头人资助项目(08226056)
关键词 圆锥曲线 多重密钥共享 离散对数 身份认证 Conic curve Multi-secret sharing Discrete logarithm Identity authentication
  • 相关文献

参考文献11

  • 1何业锋,张建中.基于Diffie-Hellman密码体制可验证的动态秘密分享方案[J].陕西师范大学学报(自然科学版),2005,33(1):26-28. 被引量:6
  • 2肖立国,钟诚,陈国良.基于椭圆曲线密码体制的动态秘密共享方案[J].微电子学与计算机,2002,19(1):30-31. 被引量:23
  • 3沈建涛,闫鸿滨.基于圆锥曲线密码的多层次秘密共享方案[J].测控技术,2012,31(3):98-100. 被引量:3
  • 4A Charles and B John. A modular approach to key safeguarding [J]. IEEE Transactions on Information Theory. 1983,29 (2): 208-210.
  • 5李惠贤.多秘密共享理论及其应用研究[D].大连理工大学,2006-4.
  • 6C C Yang, T Y Chang, M S Hwang. A (t, n) Multi-secret Sha- ring Scheme [ J ]. Applied Mathematics and Computation, 2004, 151 (2) :483-490.
  • 7Pang Liaojun, Wang Yumin. A New ( t, n) Multi-secret Sharing Scheme Based on Shamir's Secret Sharing[ J]. Applied Mathemat- ics and Computation, 2005,167 (2) : 840-848.
  • 8L Ham. Efficient Sharing (Broadcasting) of Multiple Secret[ C]. IEEE Proceedings on Computers and Digital Techniques, 1995, 142(3) :237-240.
  • 9Shao Jun, Cao Zhenfu. A New Efficient (t, n) Verifiable Multi- secret Sharing ( VMSS ) Based on YCH Scheme [ J ]. Applied Mathematics and Computation, 2005,168 ( 1 ) : 135-140.
  • 10Zhao Jianjie, Zhang Jianzhong, Zhao Rong. A Practical Verifia- ble Multi-secret Sharing Scheme[J]. Computer Standards & In- terfaces, 2007,29( 1 ) : 138-141.

二级参考文献28

共引文献26

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部