期刊文献+

门限多重影子秘密共享方案及应用 被引量:1

Threshold Multiple Shadows-secret Sharing Scheme and Its Application
下载PDF
导出
摘要 针对多个秘密由多个秘密持有者提供的情况,提出了一个门限多重影子秘密共享方案。方案中门限构成对影子秘密的保护,影子秘密与秘密持有者的私钥又构成对秘密的保护。该方案不惧怕数据分配中心及共享成员的欺骗行为并且秘密持有者在恢复他自己的秘密时不会对属于其他持有者的秘密构成安全威胁。 For the situation that multiple secret are offered by several secret holders,athreshold multiple shadows-secret sharing scheme is proposed. In this scheme shadows-secret is protected by threshold,and secret is protected by shadows-secret and holder's private key. The scheme is doesn't fear distribution center or share members' frauds. And also the resumption of the holder's own secrets will not threaten others'.
作者 杨捷
出处 《南京工业职业技术学院学报》 2014年第2期51-53,共3页 Journal of Nanjing Institute of Industry Technology
关键词 多重秘密 门限方案 分配中心 影子秘密 multiple secret threshold scheme distribution center shadows-secret
  • 相关文献

参考文献6

  • 1SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979,22 ( 11 ) :612 - 6113.
  • 2BLAKLEY G R. Safeguarding cryptographic keys [C]//Pro- ceedings of National Computer Conference. Montvale, NJ: AFIPS Press, 1979,48:313 - 317.
  • 3STADLER M. Publicly verifiable secret sharing [C]//Proc. of Advances in Cryptology-Eurocrypt'96. Berlin: Springer- Verlag 1996,190 - 199.
  • 4Yang CC, Chang T Y, Hwang M S, A ( t, n) multi-secret sha- ring scheme [J]. Applied Mathematics and Computation, 2004,151 (2) :483 -490.
  • 5黄东平,刘铎,王道顺,戴一奇.一种安全的门限多秘密共享方案[J].电子学报,2006,34(11):1937-1940. 被引量:6
  • 6杨捷,李继国.基于密钥协商的门限多秘密共享方案[J].计算机工程,2010,36(20):153-154. 被引量:3

二级参考文献16

  • 1许春香,肖国镇.门限多重秘密共享方案[J].电子学报,2004,32(10):1688-1689. 被引量:41
  • 2甘元驹,谢仕义,付东洋.防欺诈的动态(t,n)门限多秘密共享方案[J].四川大学学报(工程科学版),2006,38(6):131-134. 被引量:7
  • 3Shamir A.How to Share a Secret[J].Communication of the ACM,1979,22(11):612-613.
  • 4Pinch R G E.Online Multiple Secret Sharing[J].Electronics Letters,1996,32(12):1087-1088.
  • 5Pang Liaojun,Wang Yumin.A New (t,n) Multi-secret Sharing Scheme Based on Shamir's Secret Sharing[J].Applied Mathematics and Computation,2005,167(2):840-848.
  • 6Stadler M.Public Verifiable Secret Sharing[C] //Proc.of Eurocrypt'96.Berlin,Germany:Springer-Verlag,1996:190-199.
  • 7Shamir A. How to share a secret [ J ]. Communications of the ACM, 1979,22( 11):612- 613.
  • 8Blakley G R, Safeguarding cryptographic keys[A]. Proceedings of National Computer Conference [C]. Montvale, NJ: AFIPS Press, 1979.48:313 - 317.
  • 9Stadler M. Publicly verifiable secret sharing[A]. Advances in Cryptology-Eurocrypt' 96 [C]. Berlin: Springer Verlag, 1996. 190- 199.
  • 10Fabfice Boudot, Jacques Traore. Efficient publicly verifiable secret sharing schemes with fast or delayed recovery[ A ]. Lecture Notes in Computer Science 1726[ C ]. Berlin: Springer Verlag, 1999.87 - 102.

共引文献7

同被引文献8

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部