期刊文献+

一个可验证的门限多秘密分享方案 被引量:1

A Verifiable Multiple Secrets Sharing Scheme
下载PDF
导出
摘要 基于离散对数计算和大整数分解的困难性、利用RSA加密体制提出了一个新的门限多秘密分享方案。该方案通过零知识证明等协议来防止秘密分发者和秘密分享者的欺诈行为,因而是一个可验证的门限多秘密分享方案。该方案还具有:秘密影子可重复使用;子秘密影子可离线验证;供分享的秘密不需事先作预计算等特点。该方案可用于会议密钥(秘密)分配、安全多方计算、门限数字签名等应用领域。 A new multiple secrets sharing scheme, based on the intractability of the discrete logarithm (DL) and the RSA encryption algorithm is presented, in which the participants' shadows remain secret and can be reused, even if all subshadows are made public. Meanwhile, by using a zero-knowledge proof protocol, the validity verification of shadow and subshadow is also provided to prevent both dealer cheating and other participant cheating, and any freely given secrets without pre-computation by dealer can be reconstructed. The scheme can be applied to many areas such as conference key distribution, secure multi-part-computation, threshold signature etc.
出处 《四川工业学院学报》 2003年第B12期121-124,共4页 Journal of Sichuan University of Science and Technology
基金 国家自然科学基金(No:69825102)的资助。
关键词 秘密分享 门限体制 离散对数 RSA加密体制 零知识证明 multi-secret sharing threshold scheme discrete logarithm RSA zero-knowledge proof
  • 相关文献

参考文献10

  • 1张福泰 王育民 郑东.用签密构造可验证秘密分享方案[A]..CCICS'2001论文集[C].北京:科学出版社,2001.244~248.
  • 2E F Brickell, D.M.Daveport. On the classification of idea secret sharing scheme[J] J Cryptology, 1991,4(2) 123-134.
  • 3P A Fouque, G Poupard, J Stern, Sharing deeryption in the context of voting or lotteries, Financial Cryptography 2000 Proceedings[M]. Springer Verlag, 2000.
  • 4M Tompa, H Woll. How to share a secret with cheaters[J].Journal of Cryptology, 1 (2) : 133- 138,1988.
  • 5B Chor, S Goldwasser, S Micali, B Awerbuch, Veriable secret sharing and achieving simultaneity in the presence of faults[M].Proceedings of 26th FOCS, 1985. 251-260.
  • 6M Stadler, Publicly verifiable secret sharing [ M ].Eurocrypt'96, LNCS, 190-199.
  • 7R G E Pinch, Online multiple secret sharing [J ]. Electronics Letters, 1996, 32(12).
  • 8R Gennaro S Mieali, Verifiable secret sharing as secure computation, Advances in cryptology - Crypto'94, Springer Verlag[M]. 1995.168-182.
  • 9L Harn. Efficient sharing of multiple secrets[J]. IEE Proc -Comput.Digit Tech 1995, 142(3):237-240.
  • 10F Boudot, J Traor', Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery [ M ] . Proc of ICICS'99. Springer-Verlag, 1999.

同被引文献5

引证文献1

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部