期刊文献+

基于线性码上无可信第三方的多秘密共享方案 被引量:1

Multi-secret Sharing Scheme Without a Trusted Third Party Based on Linear Codes
下载PDF
导出
摘要 为了避免秘密共享方案中第三方的不诚实行为造成的威胁,利用Massey线性码上的秘密共享体制,提出了一个无可信第三方的多秘密共享方案。该方案的重构算法满足加法同态性,其中每个参与方既是参与者也是分发者。同时方案实现了非门限结构上的无分发者的秘密共享,适用于更广泛的存取结构。证明了方案的正确性和安全性,并通过效率分析表明该方案只需较小的存储空间。此外,基于方案中重构算法的同态性给出了一种设计安全多方计算协议的方法。 To avoid the collapse caused by a dishonest third party,this paper presents a dynamic multi secret sharing scheme without a trusted third party based on Massey secret sharing scheme using linear codes.The secret reconstruction algorithm meets the property of additive homomorphism,where each participant also plays a role as a dealer.Meanwhile,the new proposal achieves non threshold access structure secret sharing that can be widely used.The correctness and security are proved.Analysis on the efficiency shows that the scheme needs small data storage space.Furthermore,on the basis of the homomorphism property of the reconstruction algorithm,a method for constructing secure multi party computation protocols is given.
作者 刘荣香 赖红
出处 《青岛科技大学学报(自然科学版)》 CAS 北大核心 2014年第5期539-542,546,共5页 Journal of Qingdao University of Science and Technology:Natural Science Edition
关键词 无可信第三方的秘密共享 加法同态性 安全多方计算 secret sharing scheme without a trusted third party additive homomorphism secure multi-party computation
  • 相关文献

参考文献9

  • 1Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2Blakley G.Safeguarding cryptographic keys[C]//Merwin R E,Zanca J T,Smith M.Proceedings of the National Computer Conference.Berlin:Springer-Verlag,1979,48:313-317.
  • 3Benaloh J,Leichter J.Generalized secret sharing and monotone functions[C]//Proceedings on Advances in Cryptology,New York:Springer-Verlag,1990:27-35.
  • 4Das A,Adhikari A.An efficient multi-use multi-secret sharing scheme based on hash function[J].Applied Mathematics Letters,2010,23(9):993-996.
  • 5Ito M,Saito A,Nishizeki T.Secret sharing scheme realizing general access structure[J].Electronics and Communications in Japan(Part III:Fundamental Electronic Science),1989,72(9):56-64.
  • 6Harn L,Lin C.Strong(n;t;n)verifiable secret sharing scheme[J].Information Sciences,2010,180(16):3059-3064.
  • 7Liu Y X,Harn L,Yang C N,et al.Efficient(n,t,n)secret sharing schemes[J].The Journal of Systems and Software,2012,85(16):1325-1332.
  • 8Massey J L.Minimal codewords and secret sharing[C]//Proceedings of the 6th Joint Swedish-Russian International Workshop on Information Theory,1993:276-279.
  • 9Massey J L.Some applications of coding theory in cryptography[M].Oxford:Oxford University Press,1995:33-47.

同被引文献8

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部