期刊文献+

基于LDPC码的秘密共享方案

Secret sharing scheme based on LDPC
下载PDF
导出
摘要 信息安全保密已成为当今信息时代的重要研究课题,因此秘密共享方案应运而生。在秘密共享方案中,利用LDPC码的编码实现秘密份额的分发,在LDPC码中,每一个非零码字都是极小码字,将秘密共享方案里的极小授权集与LDPC码的极小码字联系起来,通过极小授权集,实现秘密的重构。由于秘密份额在信道中传输会受到影响,所以恢复出来的秘密存在误码,所以利用一步大数逻辑译码纠错。实验表明,此方案实现了秘密分享,安全性高,又简单可行。 The secrecy of information safety has become an important research topic m present information age. In consequence, secret sharing scheme arises in this situation. The secret sharing scheme makes secret share's distribution come true by LDPC code's encoding. In LDPC code, because every nonzero code is minimum code, it connects minimum license sets with LDPC's minimum code in secret sharing scheme and it uses minimum license sets to restore secret. Because secret sharing transmission in channel is influenced, the restored secret has error code. So it uses step number logic decoding to correct error. The experiment indicates, the scheme makes secret sharing come true. It has high safety and simplicity.
作者 周静
出处 《信息技术》 2014年第11期167-170,共4页 Information Technology
关键词 安全 秘密共享 LDPC 极小授权集 security secret sharing LDPC minimum license sets
  • 相关文献

参考文献7

  • 1Shamir A.How to share a secret[J].Communication of the ACM,1979,22(11):612-613.
  • 2Blakly GR.Safeguarding cryptographic Keys[C]//Proceedings of AFIPS 1979 National Computer Conference,1979:313-317.
  • 3王海艳,王汝传.秘密共享方案的研究[J].微机发展,2005,15(3):32-34. 被引量:6
  • 4Gallager RG.Low density parity check codes[J].IEEE Transactions on Information Theory,1962,8(3):208-220.
  • 5ShuLin,Daniel J.Costello,Jr.差错控制编码[M].北京:机械工业出版社,2007.
  • 6Jin Yuan,Ding Cun-sheng.Secret Sharing Schemes From Three Classes of Linear Codes[J].IEEE Transactions On Information Theory,2006,52(1):206-212.
  • 7Ding Yuan,Rong-sheng Huanan.A New Secret Sharing Scheme From Linear Code[J].International Conference on Machine Learning and Cybernetics,2009,6:3204-3208.

二级参考文献5

  • 1SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11) :612 -613.
  • 2CHOR B, GOI.DWASSER S, MICALI S, et al. Verifiable secret sharing and achieving simultaneity in the presence of faults[A]. Proceeding of 26th IEEE Symposium on Foundations of Computer Science (FOCS '85) [C]. Oakland: IEEE Computer Society Press, 1985. 335 - 344.
  • 3FELDMAN P. A practical scheme for non- interactive verifiable secret sharing [A]. Proceeding of the 28th IEEE Annual Symposium on Foundations of Computer Science [ C]. Oakland: IEEE Computer Society, 1987. 427 - 437.
  • 4PEDERSEN T P. Non- interactive and information- theoretie secure verifiable secret sharing [A]. Proceedings of the 11st Annual International Cryptology Corfference on Advances in Cryptology [ C]. London: Springer - Verlag, 1991. 129 -140.
  • 5STADLER M. Publicly verifiable secret sharing [Z]. Advances in Cryptology - EUROCRYPT' 96, Lecture Notes in Computer Science, 1996, 1070: 190-199.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部