期刊文献+

基于非循环多项式数列的秘密共享方案 被引量:3

The Secret sharing scheme based on acyclic polynomial sequence
原文传递
导出
摘要 作者引入了多项式数列的概念,给出并证明了它的一些性质.在此基础之上通过利用门限秘密共享的思想和非循环多项式数列的特性设计出具有两类不同访问权限的(u+v,t+1)秘密共享门限方案,结果表明此门限方案是一种安全的、有效的、实用的而且易于实现的密钥共享体制. The author introduces the concept of polynomial sequence. Some properties about the polyno- mial sequence which constant term is one are gave and proved in this paper. On the basis of this, a (u+ v,t+1)-secret sharing threshold scheme having two kinds of different access right is designed by means of using the thought of secret sharing and the performance of acyclic polynomial sequence. The results reveal that this threshold scheme is a secure effective and practical secret sharing scheme. Furthermore, it can be carried out easily through a instantiation that involves solving indeterminate equations.
作者 李滨
出处 《四川大学学报(自然科学版)》 CAS CSCD 北大核心 2014年第3期423-427,共5页 Journal of Sichuan University(Natural Science Edition)
基金 四川省科研项目(12ZB276)
关键词 多项式数列 秘密共享 门限方案 Polynomial sequence Secret sharing Threshold scheme
  • 相关文献

参考文献12

  • 1Shamir A.How to share a secret [J].Communica- tions of the ACM,1979,22(11):612.
  • 2Blakley G R.Safeguarding cryptographic keys [C]//AFIPS Conference Proceedings.New Jersy:AFIPS Press,1979.
  • 3McEliece R J,Sarwate D V.On sharing secrets and Reed-Solomon codes [J].Communications of the ACM,1981,24(3):583.
  • 4Davida G I,Demillo R A,Lipton R J.Protecting Shared Cryptographic keys [M].Silver Spring:IEEE Computer Society Press,1980.
  • 5Kothari S C.Generalized linear threshold scheme [C]//Proceeding of CRY-PTO' 84.Berlin:Springer Vertag,1984.
  • 6Asmuth C,Bloom J.A modular approach to key safe guarding[J].IEEE Transactions on Informa- tion Theory,1983,29(2):208.
  • 7Karnin E D,Green J W,Hellman M E.On sharing secret systems [J].IEEE Transactions on Informa- tion Theory,1983,29(1):35.
  • 8李滨.基于特殊访问权限的差分秘密共享方案[J].四川大学学报(自然科学版),2006,43(1):78-83. 被引量:20
  • 9Ito M,Saito A,Nishizeki T.Secret sharing scheme realizing general access structure [C]//Proceedings of IEEE Global Telecommunication Conference Glo- becom 87.Silver Spring IEEE Computer Society Press,1987.
  • 10Laih C S,Harn L,Lee J.Dynamic threshold scheme based on the definition of cross-product in an n-dimensional linear space [C]//Proceeding of CRYPTO'89.Berlin:Springer Verlag,1989.

二级参考文献9

  • 1karnin E D,Green J W,Hellman M E.On Sharing Secret Systems [J].IEEE Transactions on Information Theory,1983,29(1):35-41.
  • 2Rifa-Coma J.How to Avoid the Cheaters Succeeding in the Key Sharing Scheme.Designs [J].Codes and Cryptography,1993,3(3):221-228.
  • 3Benaloh J C.Secret Sharing Hornomorphisrns [J].Keeping Shares of a Secret,Advances in Cryptology-CRYPTO'86,1987:251 - 260.
  • 4Shamir A.How to Share a Secret[J].Communications of theACM,1979,22(11):612-613.
  • 5Blakley G R.Safeguarding Cryptographic Keys.In:Proceedings of the National Computer Conference [J].AFIPS,1979,48:313-317.
  • 6Stinson D R.Cryptography:Theory and Practice [M].Boca Raton:CRC Press,Inc,1995.
  • 7Ito M,Saito A.T.Nishizeki Secret Sharing Scheme Realizing General Access Structure [M].Proc.IEEE Global Telecommunication Conf.Globecom 87,1987,99 - 102.
  • 8Feldman P.A ractical Scheme for Non-interactive Verifiable Secret Sharing [J].In:Proc.28th IEEE Symposium on Foundations of Computer Sciences (FOCS'87).Los Angeles:IEEE Computer Society,1987,427- 437.
  • 9Pedersen T P.No-interactive and Information-theoretic Secure Verifiable Secret Sharing [J].In:Feigenbaum J,et al.Advances in Cryptology-Crypto'91 Proceedings,LNCS 576.Berlin:Springer-Verlag,1992,129-140.

共引文献19

同被引文献29

  • 1XIAOLiangliang LIUMulan.THRESHOLD SCHEMES WITH WEIGHTS[J].Journal of Systems Science & Complexity,2004,17(4):578-581. 被引量:5
  • 2李滨.基于特殊访问权限的差分秘密共享方案[J].四川大学学报(自然科学版),2006,43(1):78-83. 被引量:20
  • 3SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 4BLAKLEY G R.Safeguarding cryptographic keys[C]//Proceedings of the National Computer Conference,New Jersey:AFIPS Press,1979:313-317.
  • 5MCELIECE R J,SARWATE D V.On sharing secrets and Reed-Solomon codes[J].Communications of the ACM,1981,24(3):583-584.
  • 6ASMUTH C,BLOOM J.A modular approach to key safe guarding[J].IEEE Transactions on Information Theory,1983,29(2):208-210.
  • 7KAMIN E D,GREEN J W,HELLMAN M E.On sharing secret system[J].IEEE Transaction on Information Theory,1983,29(1):35-41.
  • 8BARWICK S G,JACKSON W A,MARTIN K M.Updating the parameters of a threshold scheme by minimal broadcast[J].IEEE Transactions on Information Theory,2005,51(4):620-633.
  • 9NOJOUMIAN M,STINSON D R.On dealer-free dynamic threshold schemes[J].Advances in Mathematics of Communications,2013,7(1):39-56.
  • 10FEIGE U,FIAT A,SHAMIR A.Zero-knowledge proofs of identity[J].Journal of Cryptology,1988,1(2):77-94.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部