期刊文献+

基于离散对数的在线秘密分享方案 被引量:2

A New On-line Secret Sharing Scheme Based on the Discrete Logarithms
在线阅读 下载PDF
导出
摘要 基于有限域上离散对数难解问题提出了一个新的在线秘密分享方案,解决了秘密的更新和复用问题。相对于Yeun等提出的基于离散对数的秘密分享机制,新方案大大减少了计算量,同时可以防止不诚实成员的欺诈,效率高且易实现。 A new on-line secret sharing scheme based on the computation difficulty of computing discrete logarithms is proposed in this paper.The renew and reuse problems of secret are properly treated in the scheme.ln particularly,the scheme is more computationaly efficient than the Yeun's secret sharing scheme based on discrete logarithms.At the same time,the scheme is efficient and practice,and can detect the cheaters.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第25期127-128,共2页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(编号:10271069) 陕西省自然科学基金研究计划项目:密码协议的设计及分析逻辑(编号:2004A14)
关键词 离散对数 秘密分享 欺诈 discrete logarithms,secret sharing,cheating
  • 相关文献

参考文献7

二级参考文献19

  • 1Chan Yeob Yeun Chris J Mitchell.How to identify all cheater in pinch''s scheme [A]..JWIS′98 [C].Singapore:Japan-Singapore Joint Workshop on Information Security,1998..
  • 2[1] SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22:612~613.
  • 3[2] BLAKLEY G R.Safeguarding cryptographic keys[A].Proc AFIPS 1979 National Computer Conference[C].1979.313~317.
  • 4[3] SCHNEIER B.Applied Cryptography[M].John Wiley & Sons,Inc,1994.
  • 5[4] STINSON D R.Decomposition constructions for secret sharing schemes[J].IEEE Trans on Inform Theory,1994, 40:118~125.
  • 6[5] LAIH C-S,HARN L,LEE J Y,et al.Dynamic threshold scheme based on the definition of cross-product in an N-dimensional linear space[A].Proc Crypto'89[C].1990.286~297.
  • 7[6] BEIMEL A,CHOR B.Secret sharing with public reconstruction[A].Advances in Cryptology-Crypto'95[C].1995.353~366.
  • 8[7] BLUNDO C,GRESSTI A,SANTIS A D,et al.Fully dynamic secret sharing schemes[A].Proc Crypto'93[C].1994.110~125.
  • 9[8] BLUNDO C,SANTIS A D,CRESCENZO G D,et al.Multi-secret sharing schemes[A].Proc Crypto'94[C].1994.150~163.
  • 10He J,Electron Lett,1994年,30卷,19期,1591页

共引文献50

同被引文献17

  • 1刘锋,张建中.一个完善的可公开验证秘密分享方案[J].计算机应用研究,2006,23(5):96-97. 被引量:2
  • 2庞辽军,柳毅,王育民.一个有效的(t,n)门限多重秘密共享体制[J].电子学报,2006,34(4):587-589. 被引量:26
  • 3Shamir A.How to Share a Secret[J].Communications of the ACM,1979,22(11):612-613.
  • 4Blakley G.Safeguarding Cryptographic Keys[C].New York:Proc.of AFIPS National Computer Conference,1979.313-317.
  • 5Tompa M,Woll H.How to Share a Secret with Cheaters[J].Journal Cryptology,1988,1(2):133-138.
  • 6Chan Yeob Yeun,Bhris J Mitchell.How to Identify all Cheaters in Pinch's Scheme[C].Singspore:JWIS,1998.
  • 7Hwang R J,Chang C C.An On-line Secret Sharing Scheme for Multisecrets[J].Computer Communications,1998,21(13):1170-1176.
  • 8Garey M R,Johnson D S.Computers and Intractability:A Guide to the Theory of NP-Completeness[M].W.H.Freeman and Co.,1979.
  • 9Asmuth C,Bloom J.A modular approach to key safegrarding[J].IEEE Transactions on Information Theory,1983,29(2):208-210.
  • 10Karnin E D,Green J W,Hellman M E.On sharing secretsystem[J].IEEE Transactions on Information Theory,1983,29 (1):35-41.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部