期刊文献+

向量空间接入结构上的高效可验证秘密分享 被引量:3

Efficient Verifiable Secret Sharing on Vector Space Access Structures
下载PDF
导出
摘要 可验证秘密分享是信息安全和密码学中的一个重要研究课题,在诸如对机密信息的安全保存与合法利用、密钥托管、面向群体的密码学、多方安全计算、接入控制及电子商务等许多方面都有着广泛的应用。针对目前对一般接入结构上的可验证秘密分享的研究非常薄弱这一特点,该文对一类具有良好代数性质的接入结构———向量空间接入结构上的可验证秘密分享进行了研究。提出了一个安全高效的广义可验证秘密分享协议。新提出的协议不仅具有最优的信息速率,而且计算和通信代价都远远地低于已有的同类协议。 Verifiable secret sharing is an important research area in information security and cryptography.It has wide applications in such fields as the safeguarding and legal use of confidential information,key escrow,group oriented cryptography,secure multiparty computation,access control and electronic commerce.But up to now,the study of verifiable secret sharing on general access structures is very weak.Aiming at this drawback,this paper does some research on verifiable secret sharing on vector space access structures with good algebraic properties.A secure and efficient generalized verifiable secret sharing protocol is proposed.Compared with similar protocols available,the newly proposed protocol has not only a maximum information rate,but also a far lower cost of computation and communication.
出处 《计算机工程与应用》 CSCD 北大核心 2002年第3期60-62,73,共4页 Computer Engineering and Applications
基金 国家自然科学基金(编号:60073052) 教育部博士点基金(编号:2000070101)
关键词 可验证密秘分享 向量空间 信息安全 密码学 Verifiable secret sharing,Vector Space,information security,cryptography
  • 相关文献

参考文献13

  • 1[1]Shamir A.How to share a secret[J].Communications of the ACM, 1979;24( 11 ) :612-613
  • 2[2]Blakley G R.Safeguarding cryptographic keys[C].Proceedings of the National Computer Conference,1979;48:242-268
  • 3[3]Benaloh J,Leichter J.Generalized secret sharing and monotone functions[C].In:S Goldwasser ed.,Lecture Notes in Computer Science,Advances in Cryptology-CRYPTO '88,1989;403:27-35
  • 4[4]Ito M,Salto A,Nishizeki T.Secret sharing scheme realizing general access structure[J].Electron. Comm. Japan Part III Fund.Electron.Sci., 1989;72: 56-63
  • 5[5]Brickell E F.Some ideal secret sharing schemes[J].Journal of Combinatorial Mathematics and Combinatorial Computing, 1989;6:105-113
  • 6[6]Padro C,Saez G,Villar J L. Detection of cheaters in vector space secret sharing schemes,Designs[J].Codes and cryptography,1999;16:75-85
  • 7[7]Chor B,Goldwasser S,Micali S,Awerbuch B.Verifiable secret sharing and achieving simultaneity in the presence of faults[C].Proceedings of 26th IEEEsymposium on Foundations of computer science, 1985:383-395
  • 8[8]Feldman P.A practical scheme for non-interactive verifiable secret sharing[C].Proceedings of 28th IEEE symposium on Foundations of Computer Science, 1987:427-437
  • 9[9]Pedersen T P. Non-interactive and information-theoretic secure verifiable secret sharinf[C].CRYPTO91, 1991:129-139
  • 10[10]Gennaro R.Theory and practice of verifiable secret sharing[D].Ph.D.Thesis.MIT, 1996

同被引文献22

  • 1Blakley G R. Safeguarding cryptographic keys[A]. Proceedings of AFIPS 1979 National Computer Conference[C]. New York: AFIPS, 1979,48:313-317.
  • 2Chor B, Goldwasser S, Micali S, et al. Verifiable secret sharing and achieving simultaneity in the presence of faults[A]. Proceedings of 26th IEEE Symposium on Foundations of Computer Science[C]. Oregon, Portland: IEEE, 1985.383-395.
  • 3Stadler M. Publicly verifiable secret sharing[A]. Advances in Cryptology, Eurocrypt'96, LNCS 1070[C]. Berlin: Springer Verlag, 1996.190-199.
  • 4Hwang Renjun, Chang Chinchen. An on-line secret sharing scheme for multi-secrets[J]. Computer Communications, 1998,21:1170-1176.
  • 5He J, Dawson E. Multisecret-sharing scheme based on one-way function[J]. Electronics Letters, 1995,19:93-94.
  • 6Shamir A. How to share a secret[J]. Commun ACM, 1979,22(11):612-613.
  • 7Padró C, Sаez G, Villar J L. Detection of cheaters in vector space secret sharing scheme[J]. Designs Codes and Cryptography, 1999,16:75-85.
  • 8Padró C. Robust vector space secret sharing schemes[J]. Information Processing Letters Elsevier Science B V, 1998,68(3):107-111.
  • 9SchneierB 吴世忠 祝世雄 张文政译.应用密码学--协议、算法、与C源程序(第2版)[M].北京:机械工业出版社,2001..
  • 10闵嗣鹤 严士健.初等数论[M].北京:高等教育出版社,1998..

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部