期刊文献+

门限多重秘密共享方案 被引量:41

A Threshold Multiple Secret Sharing Scheme
在线阅读 下载PDF
导出
摘要 本文提出了一个门限多重秘密共享方案 ,其安全性依赖于RSA数字签名的安全性 ,即大数分解的困难性 .该方案具有如下特点 :参与者的子秘密可反复使用 ,可用来共享任意多个秘密 ;能有效预防管理员欺诈及参与者之间的互相欺骗 ;此外 ,在验证是否有欺诈行为存在的过程中 ,不需要执行交互协议 . A threshold multiple secret sharing scheme is proposed.Its security is based on the security of RSA signature.i.e.the difficulty of factoring large integers.This scheme has the following characteristics:The shares can be repeatedly used for the reconstruction of multiple secrets.The cheating of dealer and the cheating between participants can be detected.In addition,the interactive protocol is not required while detecting the cheaters.
出处 《电子学报》 EI CAS CSCD 北大核心 2004年第10期1688-1689,1687,共3页 Acta Electronica Sinica
基金 国家自然科学基金重大项目 (No 90 1 0 4 0 0 5) 973项目 (No G1 9990 3580 4 ) 陕西省自然科学基金 (2 0 0 3F0 6)
关键词 秘密共享 门限方案 多重秘密共享 RSA数字签名 secret sharing threshold scheme multiple secret sharing RSA signature
  • 相关文献

参考文献9

  • 1A Shamir.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2H.-Y.Lin,Harn L.A generalized secret sharing scheme with cheater detection[A].Advances in Cryptology-ASIACRYPT'91 Proceedings[C],Berlin:Springer-Verlag,1993.149-158.
  • 3M Carpentieri.A perfect threshold secret sharing scheme to identify cheaters[J].Designs,Codes and Cryptography,1995,5(3):183-197.
  • 4J Rifa-Coma.How to avoid the cheaters succeeding in the key sharing scheme[J].Designs,Codes and cryptography,1993,3(3):221-228.
  • 5E F Brickell,D R Stinson.The detection of cheaters in threshold scheme[A].Advances in Cryptology-CRYPTO'88[C],Berlin:Springer-Verlag,1988.564-577.
  • 6L Harn,H Lin.An l-span generalized secret sharing scheme[A].Advances in Cryptology-CRYPTO'92[C].Berlin:Springer-Verlag,1992.558-565.
  • 7L Harn.Efficient sharing (Broadcasting) of multiple secrets,IEE Proc.-Comput.Digit.Tech.1995,142(3):237-240.
  • 8L Chen,D Gollmann,C J Mitchell,P Wild.Secret sharing with reusable polynomials[A].The Second Australasian Conference on Information Security and Privacy-ACISP'97[C].Berlin:Springer-Verlag,1997.183-192.
  • 9GENNARO R.,JARECKI S.,KRAWCZYK H.et al.Robust and efficient sharing of RSA functions[A].Advanced in Cryptology-- CRYPTO'96 Proceedings[C].Berlin:Springer Verlag,1996.157-172.

同被引文献259

引证文献41

二级引证文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部