期刊文献+

只需异或运算的秘密分享方案 被引量:1

Secret sharing scheme only needing XOR operations
下载PDF
导出
摘要 针对传统基于插值多项式的秘密分享方案,需要复杂的多项式运算,当涉及的数据比较大时,运算效率特别低的问题,提出一种结合数据分块方法以及仅需要在GF(2)上的异或运算的秘密分享方案,并应用于大规模数据的安全保护机制。理论分析与实验结果表明,与传统基于插值多项式的秘密分享方法相比,所提方法在运行效率上提升了19.3%。 The traditional secret sharing schemes based on interpolation polynomial require a heavy computational cost. When the data is large, the efficiency of operation is particularly low. Therefore, a new secret sharing scheme for protecting the security of large scale data was proposed. The proposed scheme used the data block's method and need the exclusive-OR (XOR) operation over GF(2) only. The theoretical analysis and experimental results show that, compared to the traditional secret sharing scheme based on interpolation polynomial, the new scheme is increased by 19.3% in the operational efficiency.
出处 《计算机应用》 CSCD 北大核心 2015年第7期1877-1881,1902,共6页 journal of Computer Applications
基金 国家973计划项目(2011CB302400) 国家863计划项目(2008AAO1Z402)
关键词 大规模数据 信息安全 秘密分享 RS码 异或运算 large-scale data information security secret sharing Reed-Solomon (RS) code eXclusive-OR(XOR) operation
  • 相关文献

参考文献16

  • 1李国杰,程学旗.大数据研究:未来科技及经济社会发展的重大战略领域——大数据的研究现状与科学思考[J].中国科学院院刊,2012,27(6):647-657. 被引量:1605
  • 2CAMPBELL N. Community cleverness required [J]. Nature, 2008, 455(7209): 1-1.
  • 3McNUTT M. Dealing with data [J]. Science, 2011, 331(6018): 639-806.
  • 4冯登国,张敏,李昊.大数据安全与隐私保护[J].计算机学报,2014,37(1):246-258. 被引量:727
  • 5SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 6BLAKLEY G R. Safeguarding cryptographic keys [C]// Proceed-ings of the 1979 AFIPS National Computer Conference. Monval: AFIPS Press, 1979: 313-317.
  • 7KURIHARA J, KIYOMOTO S, FUKUSHIMA K, et al. A new (k,n)-threshold secret sharing scheme and its extension [C]// Proceedings of the 11th International Conference on Information Security, LNCS 5222. Berlin: Springer, 2008: 455-470.
  • 8YANG C, LAI J. Protecting data privacy and security for cloud computing based on secret sharing [C]// ISBAST 2013: Proceedings of the 2013 International Symposium on Biometrics and Security Technologies. Piscataway: IEEE, 2013: 259-266.
  • 9van DIJK M. On the information rate of perfect secret sharing schemes [J]. Designs, Codes and Cryptography, 1995, 6(2): 143-169.
  • 10PLANK J S, XU L. Optimizing Cauchy Reed-Solomon codes for fault-tolerant network storage applications [C]// Proceedings of the 5th IEEE International Symposium on Network Computing and Applications. Piscataway: IEEE, 2006: 1-11.

二级参考文献27

  • 1姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 2Chris Anderson. The End of Theory: The Data Deluge Makes the Scientific Method Obsolete. Wired, 2008, 16 (7).
  • 3Albert-L~iszl6 Barab~isi. The network takeover. Nature Physics, 2012,8(1): 14-16.
  • 4Reuven Cohen, Shlomo Havlin. Scale-Free Networks Are U1- trasmall. Physical Review Letters, 2003, 90,(5 ).
  • 5Tony Hey, Stewart Tansley, Kristin Tolle (Editors). The Fourth Paradigm: Data-Intensive Scientific Discovery. Microsoft, 2009 October 16.
  • 6Big Data. Nature, 2008, 455(7 209): 1-136.
  • 7Dealing with data. Science, 2011,331 ( 6 018 ): 639-806.
  • 8Complexity. Nature Physics, 2012, 8( 1 ).
  • 9Big Data. ERCIM News, 2012, (89).
  • 10David Lazer, Alex Pentland, Lada Adamic et al. Computational Social Science. Science, 2009, 323 ( 5 915 ): 721-723.

共引文献2291

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部