期刊文献+

秘密共享的发展与应用综述 被引量:4

A Review of the Development and Application of Secret Sharing
下载PDF
导出
摘要 秘密共享方案为解决信息安全和密钥管理问题提供了一个崭新的思路。秘密共享可应用于数据的安全存储和加密等领域,保障了传输信息的安全性和准确性。综述了秘密共享方案,介绍了秘密共享的概念,归纳总结了多秘密共享技术、可验证秘密共享技术、无分发者秘密共享技术、可安全重构秘密共享技术、主动式秘密共享技术的发展历程及其特点。此外,列举了秘密共享技术在电子投票、数字图像、生物特征等方面的应用。 The secret sharing scheme provides a new way to solve the problem of information security and key management.Secret sharing can be applied in secure storage and encryption of data,which ensures the security and accuracy of transmitted information.This paper is a review of the secret sharing scheme,introducing the concept of secret sharing,and it also summarizes the development process and the characteristics of much secret sharing technology such as the multi-secret sharing,verifiable secret sharing,non-distributor secret sharing,security reconfigurable secret sharing,and proactive secret sharing technology.Additionally,the applications of secret sharing technology in the field of electronic voting,the field of digital image and the field of biological feature are also listed in this paper.
作者 田秀霞 张悦 颜赟成 TIAN Xiuxia;ZHANG Yue;YAN Yuncheng(School of Computer Science and Technology,Shanghai University of Electric Power,Shanghai 200090,China;School of Energy and Mechanical Engineering,Shanghai University of Electric Power,Shanghai 200090,China)
出处 《上海电力大学学报》 CAS 2022年第1期66-74,81,共10页 Journal of Shanghai University of Electric Power
基金 国家自然科学基金面上项目(61772327) 国家自然科学基金重点项目(61532021)。
关键词 隐私保护 秘密共享 加密技术 privacy protection secret sharing encryption technology
  • 相关文献

参考文献16

二级参考文献120

  • 1李彦江,马传贵,黄刘生.一种电子投票方案[J].软件学报,2005,16(10):1805-1810. 被引量:7
  • 2庞辽军,柳毅,王育民.一个有效的(t,n)门限多重秘密共享体制[J].电子学报,2006,34(4):587-589. 被引量:26
  • 3沈忠华,于秀源.一个无可信中心的有向门限签名方案[J].杭州师范学院学报(自然科学版),2006,5(2):95-98. 被引量:2
  • 4沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 5黄东平,刘铎,戴一奇.安全的多级门限多秘密共享[J].清华大学学报(自然科学版),2007,47(4):592-594. 被引量:6
  • 6[1]A Herzberg,S Jarecki,H Krawczyk,M Yung.Proactive secret sharing or:How to cope with perpetual leakage[A].Advances in Cryptology-Crypto′95,the 15th Annual International Cryptology Conference[C].Heidelberg:Springer-Verlag,1995.457-469.
  • 7[2]R Canetti,R Gennaro,A Herzberg,D Naor.Proactive security:Long-term protection against break-ins[J].CryptoBytes,1997,3(1):1-8.
  • 8[3]S Jarecki.Proactive secret sharing and public key cryptosystems[D].Cambridge:Department of Electrical Engineering and Computer Science,Massachusetts Institute of Technology,1995.
  • 9[4]Y Frankel,P Gemmell,P Mackenzie,M Yung.Optimal resilience proactive public-key cryptosystems[A].Proceedings of the 38th Annual Symp.On Foundations of Computer Science[C].New York:IEEE Press,1997.384-393.
  • 10[5]T Draelos,V Hamilton,G Istrail.Proactive DSA application and implementation[R].Albuquerque:Sandia National Laboratories,1998.

共引文献155

同被引文献37

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部