期刊文献+

基于Birkhoff插值的可验证多等级秘密共享算法

Birkhoff interpolation-based verifiable hierarchical threshold secret sharing algorithm
下载PDF
导出
摘要 分布式密钥生成(DKG)协议是分布式加密系统的重要组成部分,其允许一群参与者共同产生私钥和公钥,但只有授权的参与者子集才能重构私钥。然而,现有的基于DKG协议均是假定参与者等级相同。为此,提出基于Birkhoff插值的可验证多等级秘密共享BI-VHTSS算法。BI-VHTSS算法考虑了DKG问题,并由等级门限访问结构定义授权子集。利用Birkhoff插值和离数对数问题,验证了BI-VHTSS算法的正确性和安全性。 A Distributed Key Generation( DKG) protocol is a central component in distributed cryptosystems,it allows a group of participants to jointly generate private key and public key,but only authorised subgroups of participants are able to reconstruct private key. However,the existing literatures based on DKG protocol assume equal authority for participants.Therefore,Birkhoff Interpolation-based Verifiable Hierarchical Threshold Secret Sharing( BI-VHTSS) algorithm was proposed. Considering the problem of DKG,authorized subsets were defined by a hierarchical threshold access structure in BIVHTSS algorithm. On the basis of intractability of the Discrete Logarithm Problem( DLP) and Birkhoff interpolation,the correctness and security of the proposed algorithm were also proved.
出处 《计算机应用》 CSCD 北大核心 2016年第4期952-955,972,共5页 journal of Computer Applications
基金 国家863计划项目(2013AA040302) 上海经信委重大技术装备研制专项(ZB-ZBYZ-03-12-1067-1 沪CXY-2014-006)~~
关键词 可验证 多等级 BIRKHOFF插值 门限秘密共享 verifiable hierarchical Birkhoff interpolation threshold secret sharing
  • 相关文献

参考文献14

  • 1GENNARO R,JARECKI S,KRAWCZYK H,et al.Secure distributed key generation for discrete-log based cryptosystems[J].Journal of Cryptology,2007,20(1):51-83.
  • 2PEDERSEN T.A threshold cryptosystem without a trusted party[C]//EUROCRYPT 1991:Proceedings of the 1991 Workshop on the Theory and Application of Cryptographic Techniques.Berlin:Springer,1991:522-526.
  • 3YUAN H,ZHANG F,HUANG X,et al.Certificateless threshold signature scheme from bilinear maps[J].Information Sciences,2010,180(23):4714-4728.
  • 4HERRANZ J,RUIZ A,SáEZ G.Signcryption schemes with threshold unsigncryption,and applications[J].Designs,Codes and Cryptology,2014,70(3):1-23.
  • 5BUDURUSHI J,NEUMANN S,OLEMBO M,et al.Pretty understandable democracy-a secure and understandable Internet voting scheme[C]//Proceedings of the 2013 Eighth IEEE International Conference on Availability,Reliability and Security.Piscataway,NJ:IEEE,2013:198-207.
  • 6BASU A,SENGUPTA I,SING J K.Secured hierarchical secret sharing using ECC based signcryption[J].Security Communication Networks,2012,5(7):752-763.
  • 7TENTU A N,PAUL P,VENKAIAH V C.Ideal and perfect hierarchical secret sharing schemes[J].IACR Cryptology Eprint Archive,2013,3(4):23-32.
  • 8FARRAS O,PADRO C.Ideal hierarchical secret sharing schemes[J].IEEE Transactions on Information Theory,2012,58(5):3273-3286.
  • 9焦栋,李明楚,郭成,喻言,欧进萍.可重用多属性多等级门限秘密共享[J].计算机工程与应用,2014,50(10):7-10. 被引量:4
  • 10SIMMONS G J.How to (really) share a secret[C]//Proceedings of CRYPTO 1988,LNCS 403.Berlin:Springer,1990:390-448.

二级参考文献15

  • 1Sharnir A.How to share a secret[J].Communications of the ACM, 1979,22( 11 ) : 612-613.
  • 2Blakley G.Safeguarding cryptographic keys[C]//Proceedings AFIPS 1979 National Conference, 1997:313-317.
  • 3Simmons G J.How to(really) share a secret[C]//LNCS 403: Advances in Cryptology CRYPTO' 88,1990 : 390-448.
  • 4Brickell E F.Some ideal secret sharing schemes[J].Journal of Combinatorial Mathematics and Combinatorial Com- puting, 1989(6) : 105-113.
  • 5Tassa T.Hierarchical threshold secret sharing[J].Joumal of Cryptology, 2007,20(2) : 237-264.
  • 6Basu A,Sengupta I, Sing J K.Secured hierarchical secret sharing using ECC based signcryption[J].Security Com- munication Networks, 2012,5 (7) : 752-763.
  • 7Tentu A N, Paul P,Venkaiah V Ch.Ideal and perfect hier- archical secret sharing schemes[J].IACR Cryptology ePrint Archive, 2013.
  • 8Farras O, Padro C.Ideal hierarchical secret sharing schemes[J]. IEEE Transaction on Information Theory, 2012, 58(5): 3273-3286.
  • 9Farras O,Farre J M,Padro C.Ideal Multipartite secret sharing schemes[J].Journal of Cryptology, 2012, 25 (3) :434-463.
  • 10Mignotte M.How to share a secret[C]//LNCS 149:Pro- ceedings of the Workshop on Cryptography, 1983:371-375.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部