期刊文献+

基于多维空间参数曲线的门限秘密共享方案 被引量:1

The threshold secret sharing scheme based on hyperspace parameter curve
下载PDF
导出
摘要 引入了多维空间参数曲线的概念,提出了有限域Fp上参数曲线在实数域R上可微的思想,并给出了参数曲线上整数点的超法面方程.利用多维空间参数曲线与超法面的交点来构建参与者共享的主密钥,设计出一个直观的、安全完备的(s,n)门限秘密共享方案.结果表明,此方案在几何法中具有主密钥的单参数表示的特点,较Blakley门限秘密共享方案更具体实用,且易于实现. The notion of hyperspace parameter curve is introduced. The theory that the parameter curve in finite field Fp is differentiable in real number field R is proposed. Furthermore, the hypernormal plane equation of the integral point on the parameter curve is given. Then a participants sharing master key is constructed by using the intersection point of hyperspace parameter curve and hypernormal plane. At last, a (s, n)-threshold secret sharing scheme that is secure perfect and visual is designed. The results reveal that this secret sharing scheme has its own advantage of one-parameter representation for a master key in the geometric method. So it can be carried out easily and more concrete practical compared with the Blakley threshold secret sharing scheme.
作者 李滨
出处 《浙江大学学报(理学版)》 CAS CSCD 2014年第5期518-522,共5页 Journal of Zhejiang University(Science Edition)
基金 四川省科研资助项目(12ZB276)
关键词 门限秘密共享 多维空间参数曲线 超法面 threshold secret sharing scheme hyperspace parameter curve hypernormal plane
  • 相关文献

参考文献2

二级参考文献13

  • 1karnin E D,Green J W,Hellman M E.On Sharing Secret Systems [J].IEEE Transactions on Information Theory,1983,29(1):35-41.
  • 2Rifa-Coma J.How to Avoid the Cheaters Succeeding in the Key Sharing Scheme.Designs [J].Codes and Cryptography,1993,3(3):221-228.
  • 3Benaloh J C.Secret Sharing Hornomorphisrns [J].Keeping Shares of a Secret,Advances in Cryptology-CRYPTO'86,1987:251 - 260.
  • 4Shamir A.How to Share a Secret[J].Communications of theACM,1979,22(11):612-613.
  • 5Blakley G R.Safeguarding Cryptographic Keys.In:Proceedings of the National Computer Conference [J].AFIPS,1979,48:313-317.
  • 6Stinson D R.Cryptography:Theory and Practice [M].Boca Raton:CRC Press,Inc,1995.
  • 7Ito M,Saito A.T.Nishizeki Secret Sharing Scheme Realizing General Access Structure [M].Proc.IEEE Global Telecommunication Conf.Globecom 87,1987,99 - 102.
  • 8Feldman P.A ractical Scheme for Non-interactive Verifiable Secret Sharing [J].In:Proc.28th IEEE Symposium on Foundations of Computer Sciences (FOCS'87).Los Angeles:IEEE Computer Society,1987,427- 437.
  • 9Pedersen T P.No-interactive and Information-theoretic Secure Verifiable Secret Sharing [J].In:Feigenbaum J,et al.Advances in Cryptology-Crypto'91 Proceedings,LNCS 576.Berlin:Springer-Verlag,1992,129-140.
  • 10G. R. Blazkley, Safeguarding cryptographic keys, Proc. of the 1979 AFIPS National Computer Conference, 1979, 48: 313-317.

共引文献21

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部