期刊文献+

基于SM2与RSA签密的秘密共享方案 被引量:3

Secret Sharing Scheme based on SM2 to RSA Signcryption
下载PDF
导出
摘要 秘密分享作为密码学中的一个分支,在实际应用中存在着安全威胁。因此,设计了一种基于SM2与RSA签密的安全可验证秘密共享方案。方案中,秘密分享者A使用中国剩余定理将秘密分割成n份分享,再使用SM2与RSA签密的方案对分享份进行签名加密;秘密接收者收到签秘文件后,通过自己的私钥对文件进行解密,再获取分享者的公钥对解密结果进行验证,确保分享份的来源与正确性。当接收者需要使用原始秘密文件时,k名接收者通过使用重构功能对k份分享份进行重构,即可恢复原始秘密。 As a branch of cryptography,secret sharing has security threats in practical applications.Therefore,a secure and verifiable secret sharing scheme based on SM2 and RSA signcryption is designed.In the scheme,the secret sharer A uses the Chinese remainder theorem to divide the secret into n shares to share,and then uses the SM2 and RSA signcryption scheme to encrypt the shared shares.After receiving the signcryption file,the secret recipient decrypts the file with his own private key,and then obtains the public key of the sharer to verify the decryption result,so as to ensure the source and correctness of the share.When the receiver needs to use the original secret file,k recipients can recover the original secret by using the reconstruction function to reconstruct the k shares.
作者 韩宝杰 李子臣 HAN Bao-jie;LI Zi-chen(College of Information Engineering,Beijing Institute of Graphic Communication,Beijing 102600,China)
出处 《通信技术》 2020年第8期1976-1982,共7页 Communications Technology
基金 国家自然科学基金(No.61370188) 北京市教委科研计划一般(No.KM201610015002,No.KM201510015009) 北京市教委科研计划重点(No.KZ201510015015,No.KZ201710015010) 科技创新服务能力建设-科研水平提高定额项目(No.PXM2017_014223_000063) 北京印刷学院校级资助项目(Ec201803 Ed201802 Ea201806)。
关键词 秘密分享 中国剩余定理 SM2与RSA签密算法 重构功能 secret sharing Chinese remainder theorem SM2-RSA signcryption algorithm reconstruction function
  • 相关文献

参考文献3

二级参考文献35

  • 1庞辽军,柳毅,王育民.一个有效的(t,n)门限多重秘密共享体制[J].电子学报,2006,34(4):587-589. 被引量:26
  • 2[1]Whitfield Diffie,Martin Hellman. New Direction in Cryptography[J].IEEE Tran. Inform. Theroy, 1976;22(6) :644-654
  • 3[2]Neal Koblitz.The State of Elliptic Curve Cryptography[J].Designs、Codes and Cryptography,2000; 19:173-193
  • 4[3]J Silverman.The Arithmetic of Elliptic Curves[M].Springer-Verlag,New York, 1986
  • 5[4]J Silverman.Advanced Topics in the Arithmetic of Elliptic Curves[M].Springer-Verlag,New York, 1994
  • 6[5]Public Key Cryptography for Financial Service Industry :The Elliptic Curve Digital Signature Algorithm(ECDSA)[S].ANSI-X9.62-1998, American Bankers Association,Working Draft,1998
  • 7[6]public Key Cryptography for Financial Service Industry:Key Agreement and Key Transport Using Elliptic Curve Cryptography[S].ANSI-X9.63-1998 ,American Bankers Association,Working Draft,1998.8
  • 8[7]Standard Specifications for Public Key Cryptography. IEEE P1363,Http:∥www.ieee .org/grouper/1363/contrib .html, 2000.8
  • 9[8]Http:∥www.ietf. cnri.reston.va.us
  • 10[9]D Terr.A Modification of Shanks'Baby-step Giant-step Algorithm[J].Mathematics of Computation, 1999; 69 (230): 767-773

共引文献70

同被引文献19

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部