基于Shamir秘密共享方案中的特权数组提出一个新的秘密共享方案。研究Shamir秘密共享方案中允许迹、非允许迹及特权数组的概念,分析非门限的Shamir秘密共享方案,并将允许迹、非允许迹和特权数组等概念推广到Brickell向量空间秘密共享体...基于Shamir秘密共享方案中的特权数组提出一个新的秘密共享方案。研究Shamir秘密共享方案中允许迹、非允许迹及特权数组的概念,分析非门限的Shamir秘密共享方案,并将允许迹、非允许迹和特权数组等概念推广到Brickell向量空间秘密共享体制中。该方案解决了Brickell方案中?函数的构造难题和Spiez S等人提出的公开问题,即任意长度特权数组的求解问题(Finite Fields and Their Applications,2011,No.4)。分析结果表明,该方案基于向量空间秘密共享体制所构造,具有线性性,因此计算量较小。同时在秘密重构阶段,参与者可以相互验证彼此秘密份额的真实性,具有防欺诈功能。展开更多
With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity ...With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity of their data. It is crucial to provide data sharing services that satisfy these security requirements. We introduce a reliable and secure data sharing scheme, using the threshold secret sharing technique and the ChaumPedersen zero-knowledge proof. The proposed scheme is not only effective and flexible, but also able to achieve the semantic security property. Moreover, our scheme is capable of ensuring accountability of users’ decryption keys as well as cheater identification if some users behave dishonestly. The efficiency analysis shows that the proposed scheme has a better performance in terms of computational cost, compared with the related work. It is particularly suitable for application to protect users’ medical insurance data over the cloud.展开更多
文摘基于Shamir秘密共享方案中的特权数组提出一个新的秘密共享方案。研究Shamir秘密共享方案中允许迹、非允许迹及特权数组的概念,分析非门限的Shamir秘密共享方案,并将允许迹、非允许迹和特权数组等概念推广到Brickell向量空间秘密共享体制中。该方案解决了Brickell方案中?函数的构造难题和Spiez S等人提出的公开问题,即任意长度特权数组的求解问题(Finite Fields and Their Applications,2011,No.4)。分析结果表明,该方案基于向量空间秘密共享体制所构造,具有线性性,因此计算量较小。同时在秘密重构阶段,参与者可以相互验证彼此秘密份额的真实性,具有防欺诈功能。
基金the National Key R&D Program of China (No. 2017YFB0802000)the National Natural Science Foundation of China (Nos. 61772326 and 61572303)+4 种基金the Research Fund for International Young Scientists, China (No. 61750110528)National Cryptography Development FYind for the 13th Five- Year Plan, China (No. MMJJ20170216), the Foundation of State Key Laboratory of Information Security, China (No. 2017-MS- 03)the Fundamental Research Funds for the Central Universities, China (No. GK201702004)the Scientific Research Program Funded by Shaanxi Provincial Education Department, China (No. 16JK1109), the Provincial Natural Science Foundation Research Project of Shaanxi, China (No. 2017JQ6029)the Doctoral Scientific Fund Project of Shaanxi University of Science & Technology, China (No. BJ11-12).
文摘With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity of their data. It is crucial to provide data sharing services that satisfy these security requirements. We introduce a reliable and secure data sharing scheme, using the threshold secret sharing technique and the ChaumPedersen zero-knowledge proof. The proposed scheme is not only effective and flexible, but also able to achieve the semantic security property. Moreover, our scheme is capable of ensuring accountability of users’ decryption keys as well as cheater identification if some users behave dishonestly. The efficiency analysis shows that the proposed scheme has a better performance in terms of computational cost, compared with the related work. It is particularly suitable for application to protect users’ medical insurance data over the cloud.