期刊文献+

基于Hermite插值的门限多秘密共享方案 被引量:1

Hermite Interpolation-Based Threshold Multi-Secret Sharing Scheme
下载PDF
导出
摘要 (t,n)门限共享方案是在n个参与者之间分发信息的一种加密机制,广泛应用于信息安全领域。为此,提出了基于Hermite插值的多项式的门限多秘密共享HITMSS(Hermite interpolation-based threshold multi-secret sharing)方案。利用椭圆曲线上的离散对数和双线性映射特性,实现了HITMSS方案的可验证性。HITMSS方案无需安全信道,并且参与者能够自行选择自己的份额,避免了分发者实施欺骗攻击的可能。同时,HITMSS方案能够动态地改变秘密数量,并且具有多重可用特性,降低了秘密分发的开销。与同类方案相比,提出的HITMSS方案复杂度低,安全性能高。 ( t, n) threshold secret sharing is a cryptographic mechanism to divide and disseminate information a- mong n participants, which is widely used in the field of information security. Therefore, Hermite interpolation- based threshold multi-secret sharing (HITMSS) scheme is proposed. Using the properties of discrete logarithm over elliptic curves and bilinear maps, a verifiable HITMSS scheme has been created in which there is no need for a secure channel and the participants can choose their own share. This feature avoids a possible of dealers cheating. The proposed method can change the number and value of the secrets as well as the threshold dynamicly. In addition, it has the multi-usability and reduces the cost of secret distribution. Compared with similar schemes, the proposed HITMSS scheme has low complexity and high security.
作者 李景富
出处 《测控技术》 CSCD 2016年第10期80-83,87,共5页 Measurement & Control Technology
基金 河南省重点科技攻关项目研究基金(152102210023 152102110039)
关键词 安全 可验证 多秘密 HERMITE插值 门限秘密共享 security verifiable multi-secret Hermite interpolation threshold secret sharing
  • 相关文献

参考文献1

二级参考文献15

  • 1Sharnir A.How to share a secret[J].Communications of the ACM, 1979,22( 11 ) : 612-613.
  • 2Blakley G.Safeguarding cryptographic keys[C]//Proceedings AFIPS 1979 National Conference, 1997:313-317.
  • 3Simmons G J.How to(really) share a secret[C]//LNCS 403: Advances in Cryptology CRYPTO' 88,1990 : 390-448.
  • 4Brickell E F.Some ideal secret sharing schemes[J].Journal of Combinatorial Mathematics and Combinatorial Com- puting, 1989(6) : 105-113.
  • 5Tassa T.Hierarchical threshold secret sharing[J].Joumal of Cryptology, 2007,20(2) : 237-264.
  • 6Basu A,Sengupta I, Sing J K.Secured hierarchical secret sharing using ECC based signcryption[J].Security Com- munication Networks, 2012,5 (7) : 752-763.
  • 7Tentu A N, Paul P,Venkaiah V Ch.Ideal and perfect hier- archical secret sharing schemes[J].IACR Cryptology ePrint Archive, 2013.
  • 8Farras O, Padro C.Ideal hierarchical secret sharing schemes[J]. IEEE Transaction on Information Theory, 2012, 58(5): 3273-3286.
  • 9Farras O,Farre J M,Padro C.Ideal Multipartite secret sharing schemes[J].Journal of Cryptology, 2012, 25 (3) :434-463.
  • 10Mignotte M.How to share a secret[C]//LNCS 149:Pro- ceedings of the Workshop on Cryptography, 1983:371-375.

共引文献3

同被引文献7

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部