期刊文献+

一个新的动态多秘密分享方案

A New Dynamic Multiple Secrets Sharing Scheme
在线阅读 下载PDF
导出
摘要 基于中国剩余定理,零知识证明与有限域上计算离散对数问题的困难性,提出了一种新的动态多秘密分享方案.方案可检测秘密分享成员的欺诈,解决秘密更新与子密复用问题,且可以很方便地增删系统成员.整个方案构成新颖、安全性高、计算量小、需要保密与传输的数据量都较小,因而效率高且实用. Based on the zero -knowledge proofs and the computational difficulty of computing discrete logarithms, a dynamic multiple secrets sharing scheme is proposed in this paper.It can easily identify the cheaters of all shareholders,effectively solve the renewal and reuse problems,and easily and freely accept a new participant or fire a participant.The scheme is of simple structure,high security and small computational complexity.And the amount of data to be kept secret and transferred is very small.So the scheme is relatively efficient and practical.
作者 杜红珍
出处 《咸阳师范学院学报》 2005年第2期5-6,9,共3页 Journal of Xianyang Normal University
基金 国家自然科学基金资助项目(编号:102711069)陕西省自然科学基础研究计划资助项目(编号:2004A14)陕西 师大重点科研项目资助课题。
关键词 秘密分享 离散对数 零知识证明 secret shariug diserete logarithm zero-knowledge proof
  • 相关文献

参考文献10

  • 1Shamir A.How to Share a Secret[J].Communication of the ACM, 1979,22(11):612-613.
  • 2Blackley G R. Safeguarding Cryptographic Keys[A].Proceedings of the National Conference of AFIPS[C].New York:AFIPS Press, 1979.313-317.
  • 3Sun H M,Shieh S P.Construcfon of Dynamic Threshold Schemes[J]. Electron Lett, 1994,30(24):2023-2024.
  • 4He J,Dawson E.Multistage Secret Sharing Based on one-way function[J].Electron Lett, 1994,30(19): 1591-1592.
  • 5Fujisaki E,Okamoto T.A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications [A].Advances in Cryptology, Eucrypto' 98 [C].Berlin:Springer-Verlag,1 998,32-27.
  • 6张建中,肖国镇.可防止欺诈的动态秘密分享方案[J].通信学报,2000,21(5):81-83. 被引量:31
  • 7Pinch R G E. Online Multiple Secret Sharing[J]. Electron Letts. 1996, 32(12):1087-1088.
  • 8谭凯军,诸鸿文.基于单向函数的动态秘密分享机制[J].通信学报,1999,20(7):81-84. 被引量:19
  • 9J Camenisch. Group Signature Schemes and Payment Systemns Based on the Discrete Logarithm Problem [Ph D dissertation].Hartung Gorre Verlag Konstanz,Zurich, 1998.
  • 10Fouque P A,Poupard G, Sten J.Sharing Decrption in Financial Cryptography 2000 [C].Berlin:Springer-Verlag,2000,90-104.

二级参考文献10

  • 1[1] SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22:612~613.
  • 2[2] BLAKLEY G R.Safeguarding cryptographic keys[A].Proc AFIPS 1979 National Computer Conference[C].1979.313~317.
  • 3[3] SCHNEIER B.Applied Cryptography[M].John Wiley & Sons,Inc,1994.
  • 4[4] STINSON D R.Decomposition constructions for secret sharing schemes[J].IEEE Trans on Inform Theory,1994, 40:118~125.
  • 5[5] LAIH C-S,HARN L,LEE J Y,et al.Dynamic threshold scheme based on the definition of cross-product in an N-dimensional linear space[A].Proc Crypto'89[C].1990.286~297.
  • 6[6] BEIMEL A,CHOR B.Secret sharing with public reconstruction[A].Advances in Cryptology-Crypto'95[C].1995.353~366.
  • 7[7] BLUNDO C,GRESSTI A,SANTIS A D,et al.Fully dynamic secret sharing schemes[A].Proc Crypto'93[C].1994.110~125.
  • 8[8] BLUNDO C,SANTIS A D,CRESCENZO G D,et al.Multi-secret sharing schemes[A].Proc Crypto'94[C].1994.150~163.
  • 9He J,Electron Lett,1994年,30卷,19期,1591页
  • 10Sun H M,Electron Lett,1994年,30卷,24期,2023页

共引文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部