期刊文献+

一种基于异或运算的(k,n)门限秘密共享算法 被引量:3

A(k,n)-Threshold Secret Sharing Algorithm Based on XOR Operation
下载PDF
导出
摘要 现有典型的秘密共享算法多基于SHAMIR算法构建,涉及复杂的多项式计算,数据处理速度较慢。为提高计算效率,提出一种仅基于异或运算的秘密共享算法。根据k、n输入值计算待生成的线索个数,通过与随机二进制序列进行连续异或运算生成算法所需的全部线索,并借助排列组合将所有线索进行分组形成影子秘密。实验结果表明,该算法能够实现任意份额(k,n)门限秘密共享,相较于SHAMIR算法处理速度得到大幅提升,且不存在部分秘密信息泄露的安全隐患。 Most of the existing secret sharing algorithms are constructed based on the SHAMIR algorithm,and involve complex polynomial calculations,which slows down data processing.In order to improve computational efficiency,a new secret sharing algorithm is proposed based on XOR operation.The number of clues to be generated is calculated according to the input values of k and n.Then all the clues required by the algorithm are generated by continuous XOR operation on a random binary sequence,and the clues are grouped in permutation and combinations to form a shadow secret.Experimental results show that the algorithm can realize arbitrary(k,n)-threshold secret sharing,and greatly improves the processing speed compared with the SHAMIR algorithm,while avoding the security risk of partial secret information disclosure.
作者 夏高 何成万 XIA Gao;HE Chengwan(School of Computer Science and Engineering,Wuhan Institute of Technology,Wuhan 430205,China)
出处 《计算机工程》 CAS CSCD 北大核心 2021年第10期111-115,124,共6页 Computer Engineering
基金 国家自然科学基金(61272115)。
关键词 异或运算 秘密共享 排列组合 信息安全 攻击者 XOR operation secret sharing permutation and combination information safety attacker
  • 相关文献

参考文献8

二级参考文献63

  • 1曹尔强,张沂,曹晔,潘继宏.“软件黑盒子”文件加锁和加密的一个方法[J].吉林大学学报(信息科学版),1991,17(3):11-14. 被引量:5
  • 2李滨.基于特殊访问权限的差分秘密共享方案[J].四川大学学报(自然科学版),2006,43(1):78-83. 被引量:20
  • 3Shamir A.How to share a secret.Communications of the ACM,1979;22(11):612-613
  • 4Fujii Y,Tada M,Hosaka N,et al.A fast (2,n)-threshold scheme and its application.Proc CSS,2005:631-636 (in Japanese)
  • 5Hosaka N,Tochikubo K,Fujii,Y,et al.(2,n)-threshold secret sharing systems based on binary matrices.Proc SCIS,2007 2D1-4 (in Japanese)
  • 6Kurihara J,Kiyomoto S,Fukushima K,et al.A fast (3,n)-threshold secret sharing scheme using exclusive-or operations.IEICE Trans.Fundamentals,2008;E91-A(1):127-138
  • 7Herzberg A,Jarecki S,Krawczyk H,et al Proactive secret sharing or how to cope with perpetual leakage,Advances in Cryptology:(Coppersmith D,ed,) CRYPTO ′95,Lecture Notes in Computer Science,Springer,1995; 963:339-352
  • 8SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 9BLAKLEY G R. Safeguarding cryptographic keys[A]. Managing Requirements Knowledge, International Workshop[C]. IEEE Com- puter Society, 1979.313-313.
  • 10CHOR B, GOLDWASSER S, MICALI S, et al. Verifiable secret shar- ing and achieving simultaneity in the presence of faults[A]. 2013 IEEE 54th Atmual Symposium on Foundations of Computer Science[C]. 1985. 383-395.

共引文献92

同被引文献32

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部