期刊文献+

基于RSA体制的秘密共享体制 被引量:2

The Secret Sharing Scheme Based on RSA
原文传递
导出
摘要 基于RSA体制的安全性提出了一个可防欺骗的秘密共享体制。该体制仅引入了一个时间参数就很好地解决了秘密的更新和复用问题同时也可防止参与者对相关数据的误发且实施起来更为简洁、有效。 A secret sharing scheme, which can identify cheaters, is proposed in this paper. It is based on the security of RSA. By introducing the time parameter, the problems of renew and reuse are properly solved in the scheme. It is against the attacks of providing forged shares by participants. The scheme is practical and efficient.
出处 《通信技术》 2001年第6期4-5,共2页 Communications Technology
关键词 秘密共享体制 RSA体制 保密通信 secret sharing, threshold scheme, RSA, against cheating
  • 相关文献

参考文献5

  • 1Shantir A. How to share a secret. Communications of the ACM, 1979; 22:612 - 613.
  • 2Blakley G R. Safeguarding cryptographic keys. Proc. AFIPS, New York, 1979; 48:313 - 317.
  • 3Waksha Ogata, Kaoru Kurosawa. Optimum secret sharing scheme secure against cheating. Proc. Eurocrypto'96, Berlin Heidelberg: Springer - Verlag, 1996:200 - 211.
  • 4Laib C - S, Ham L, Lee J - Y, et al. Dynamic threshold scheme based on the definition of cross - product in an N - dimensional linear space. Proc. Crypto' 89,1990; 286 - 297.
  • 5张建中,谢淑翠.一个新的可防止欺诈的动态秘密共享方案.密码学进展-CHINACRYPT’2000,北京:科学出版社,2000:108—111.

同被引文献20

  • 1[1]E F Brickell. Some ideal secret sharing schemes[J]. Combin. Math. Combin. Comput.,1989,6:105-113.
  • 2[2]E F Brickell, D M-Davenport. On the classification of ideal secret sharing schemes[J].Cryptology,1991,4:123-134.
  • 3[3]J Dj Golic. On matroid characterization of ideal secret sharing schemes[J].Cryptology,1998,11:75-86.
  • 4[4]P D Seymour. On secret sharing matroids[J]. Combin. Theory, Ser. B,1992,56:69-73.
  • 5[5]G R Blakley. Safeguarding cryptographic keys[A]. Proc. AFIPS 1979, NCC[C]. New York: 1979, 48:313-317.
  • 6[6]A Shamir. How to share a secret[J].comm. ACM,1979,22:612-613.
  • 7[7]C Blundo, A De Santis, G D Crescenzo. Multi-secret sharing schemes(extended abstract)[A].Advances in Cryptoloy-CRYPTO'94. LNCS[C].1995,839:150-163.
  • 8[8]W A Jackson, K M Marten and C M O`Keefe. Ideal secret sharing schemes with multiple secrets[J]. Cryptology, 1996,9:233-250.
  • 9[9]E F Brickell and D R Stinson. The detection of cheaters in threshold schemes[J].SIAM J.DISC. MATH,1991,4(4):502-510.
  • 10[10]G J Simmons. An introduction to shared secrets and/or shared control schemes and their application[A]. Contemporaray Cryptology. IEEE press[C]. New York: 1992,441-497

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部