期刊文献+

无条件安全的广义可验证秘密分享协议 被引量:13

AN UNCONDITIONAL SECURE GENERAL VERIFIABLE SECRET SHARING PROTOCOL
下载PDF
导出
摘要 探讨了安全高效的广义 VSS协议的设计问题 ,基于大素数阶有限域上计算离散对数的困难性和拉格朗日插值法 ,提出了一个可适用于任意接入结构的无条件安全的广义 VSS协议 ,与已有的同类协议相比 ,大大减少了秘密信息的存储量 ,具有很高的信息速率 .在计算复杂性方面与目前已有的高效门限 VSS方案相差不大 .由于其安全性、效率及代数结构方面的特点 ,这样的协议将会在分布式的密钥管理、分布式的容错计算、面向群体的密码学及电子商务中得到广泛的应用 . The problem of how to design secure and efficient general verifiable secret sharing protocol is discussed. Based on the difficulty of computing discrete logarithm over finite field of large prime order and the method of Lagrange interpolation, an unconditional secure general verifiable secret sharing protocol applicable to arbitrary access structures is presented. Compared with the protocols of the same sort, it has a higher information rate and the amount of secret information to be stored by the participants is greatly decreased. With respect to computational complexity, the newly proposed protocol just has a small increase compared with the efficient threshold verifiable secret sharing schemes available. Due to its properties of security, efficiency and algebraic structure, the proposed protocol will find wide applications in distributed key escrow, distributed fault tolerant computation, group oriented cryptography, and electronic commerce.
出处 《计算机研究与发展》 EI CSCD 北大核心 2002年第10期1199-1204,共6页 Journal of Computer Research and Development
基金 国家自然科学基金 (60 0 73 0 5 2 ) 教育部博士点基金 (2 0 0 0 0 70 10 1)资助
关键词 广义可验证秘密分享协议 秘密分享 可验证秘密分享 接入结构 离散对数 密码学 信息安全 secret sharing, verifiable secret sharing, access structure, general verifiable secret sharing, discrete logarithm
  • 相关文献

参考文献1

二级参考文献2

  • 1You C H,Computer Communications Review,1998年,28卷,5期,50页
  • 2Zhou J,Computer Security:Proc of 1996 European Symposium on Research in Computer Security,1996年,160页

共引文献13

同被引文献82

  • 1张建中 谢淑翠.一个新的可防欺诈的动态秘密分享方案[R]..密码学进展-CHINACRYPT''''[C].,2000..
  • 2[1]SHAMIR A. How to share a secret[J]. Communications of the ACM,1979,24(11):612-613.
  • 3[2]BLACKLEY G R. Safeguarding cryptographic keys[C]. In:Proceedings of the National Computer Conference of AFIPS, 1979: 313-317.
  • 4[3]TOMPA M,WOLL H. How to share a secret with a cheater[J]. Journal of Cryptology,1998,1(2):133-138.
  • 5[4]SCHNEIER B. Applied Cryptography[M]. John Wiley & Sons,Inc,1994.
  • 6[5]GENNARO R. Theory and practice of verifiable secret sharing [D]. Massachusetts Institue of Techno-logy(MIT),Camb-ridge, 1996.
  • 7[7]HE J,DAWSON E. Multistage secret sharing based on one-way function[J]. Electronics Letters,1994,30(19):1591-1592.
  • 8Pedersen T.Non-imeractivc and lnlbrmation-theoretic Secure Verifiable Secret Sharing. In: Advances in Cryptology. Cupto91, Berlin: Springer-Verlag, 1991 :129-140.
  • 9Harn L.Efficient Sharing(Broadcasting) of Multiple Secret[J].IEE Proc.of the Comput.Digit.Tech.,1995,143(3):237-240.
  • 10Lin T Y,Wu T C.Threshold Verifiable Multisecret Sharing Scheme Based on Factorization Intractability and Discrete Logarithm Modulo:A Composite Problems[J].IEE Proc.of the Comput.Digit.Tech.,1999,146(5):264-268.

引证文献13

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部