期刊文献+

基于大数分解的门限秘密共享方案 被引量:1

Secret sharing scheme based on large numbers factorization
下载PDF
导出
摘要 秘密共享在密钥管理的方法上是一个很重要的课题.提出秘密共享体制设计的一种新思路,首先根据大数分解的困难性设立不可逆的主密钥幂,然后通过不定方程整数解的存在性计算出结构方程特解的同组组合,再利用主密钥幂和同组组合的元素构建出恢复主密钥的子密钥,设计一个完备的(t,n)门限秘密共享方案,并对该门限方案进行安全性分析,结果显示该门限方案是无条件安全的. Secret sharing is a very important question on key management method.In this paper,a new idea about the design of secret sharing scheme was proposed.Firstly the irreversibility master key power was introduced on the basis of the difficulty of large numbers factorization.Then the same class combinations for the particular solutions of the structure equations were calculated through the existence of integer solution of indeterminate equation.Furthermore,the subkeys which would be used to restore the master key,were constructed by means of the master key power and the element of the same class combinations.At last,aperfect(t,n)-threshold secret sharing scheme had been established and the security analysis for this threshold scheme was given.The results showed that this threshold scheme was unconditionally secure.
作者 李滨
出处 《湖北大学学报(自然科学版)》 CAS 2014年第6期543-547,共5页 Journal of Hubei University:Natural Science
基金 四川省科研基金(12ZB276)资助
关键词 大数分解 秘密共享 门限秘密 共享方案 large numbers factorization secret sharing threshold secret sharing scheme
  • 相关文献

参考文献10

  • 1Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2Blakley G R.Safeguarding cryptographic keys[C]//AFIPS Conference Proceedings.New Jersy:AFIPS Press,1979:313-317.
  • 3McEliece R J,Sarwate D V.On sharing secrets and Reed-Solomon codes[J].Communications of the ACM,1981,24(3):583-584.
  • 4Asmuth C,Bloom J.A modular approach to key safeguarding[J].IEEE Transactions on Information Theory,1983,29(2):208-210.
  • 5Karnin E D,Green J W,Hellman M E.On sharing secret systems[J].IEEE Transactions on Information Theory,1983,29(1):35-41.
  • 6XIAOLiangliang LIUMulan.THRESHOLD SCHEMES WITH WEIGHTS[J].Journal of Systems Science & Complexity,2004,17(4):578-581. 被引量:5
  • 7Li B.Difference secret sharing scheme based on special access right[J].Journal of Sichuan University(NSE),2006,43(1):78-83.
  • 8Dehkordi M H,Mashhadi S.New efficient and practical verifiable multi-secret sharing schemes[J].Information Science,2008,9 (178):2262-2274.
  • 9Nojoumian M,Stinson D H,Grainger M.Unconditionally secure social secret sharing scheme[J].IET Information Security,2010,4(2):202-211.
  • 10Nojoumian M,Stinson D R.On dealer-free dynamic threshold schemes[J].Advances in Mathematics of Communications,2013,7(1):39-56.

二级参考文献4

  • 1G. R. Blazkley, Safeguarding cryptographic keys, Proc. of the 1979 AFIPS National Computer Conference, 1979, 48: 313-317.
  • 2A. Shamir, How to share a secret, Communications of the ACM, 1979, 22: 612-613.
  • 3A. Beimel, Secure Schemes for Secret Sharing and Key Distribution, P'hD thesis, Technion-Israel Institute of Techonlogy, 1996.
  • 4Simmons, Contemporary Cryptology: The Science of Information Integrity, IEEE Press, New York,1992.

共引文献4

同被引文献8

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部