期刊文献+

基于编码的秘密重构方法研究

Research of Secret Reconstruction Based on Coding Theory
下载PDF
导出
摘要 当前大多基于编码实现的(k,n)门限秘密分享方案在秘密重构时均假定只存在k个份额,忽略了秘密重构时可用份额数量多于门限值k的情况。而实验证明,多余的份额如果合理利用可以极大地降低秘密重构的运算量。在基于秘密分享的实用系统运行过程中,特别是网络数据传输或分布式存储系统中,可用份额数量大于门限值k的情况又是经常出现的。针对这一问题,该文提出了一种新的秘密重构方法,该方法可以有效利用秘密重构时所有的可用份额,且计算效率与当前主流方法相比有较大的提升。 Most (k,n) threshold secret sharing schemes based on coding theory ignores a case that the number of shares are more than the threshold value k when rebuilding the secret information. Such a case frequently occurs in practical systems based on secret sharing, especially the network data transmission or distributed storage systems Many experiments have proved that the amount of secret reconstruction computation can be reduced greatly if reasonably using the surplus shares. To solve this problem for secret sharing schemes based on coding theory, this paper proposes a new method of reconstructing the secret which can effectively use all available shares when reconstructing the secret, and computational efficiency has greatly improved compared with the mainstream approaches.
作者 唐聃 舒红平
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2016年第1期91-95,共5页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(61501064) 四川省科技支撑计划(2016GZ0122) 四川省教育厅科技成果转化重大培育项目(15CZ0019)
关键词 编码 秘密重构 秘密分享 门限 coding secret reconstruction secret sharing scheme threshold
  • 相关文献

参考文献4

二级参考文献112

  • 1苏中民,林行良.图视秘密的任意分存[J].计算机学报,1996,19(4):293-299. 被引量:26
  • 2SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 3BLAKLEY G R.Safeguarding cryptographic keys[C] //Proceedings of the National Computer Conference. New York: AFIPS,1979:313-317.
  • 4DAWSON E,DONOVAN D.The breadth of Shamir's secret-sharing scheme[J].Computer and Security,1994,13(1):69-78.
  • 5van DIJK M. On the information rate of perfect secret sharing schemes[J].Designs,Codes and Cryptography,1995,6(2):143-169.
  • 6CHANGCC,HUANGRJ.Sharing secret images using shadow codebooks[J].Information Sciences,1998,111 (1/2/3/4):335-345.
  • 7THIEN C C,LIN J C.Secret image sharing[J].Computers & Graphics,2002,26(5):765-770.
  • 8NAOR M,SHAMIR A.Visual cryptography[C] // Proceedings of Eurocrypt '94.Berlin:Springer-Verlag,1995:1-12.
  • 9ITO R,KUWAKADO H,TANAKA H.Image size invariant visual cryptography[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,1999,E82-A(10):2172-2177.
  • 10HOU Y C,LIN C F,CHANG C Y.Visual cryptography for color images without pixel expansion[J].Journal of Technology,2001,16(4):595-603.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部