期刊文献+

有限秘密下指派秘密共享方案的构造 被引量:2

Construction of Assignment Secret Sharing Scheme with Finite Secrets
在线阅读 下载PDF
导出
摘要 针对有限个秘密要分享的情况,提出了一种具有指派功能秘密共享方案的新实现方法。为了说明这一方法,给出了两个实现方案:第一个方案通过引入碎片向量的概念来实现;第二个方案通过引入秘密偏移量的概念来对第一个方案进行优化,能够达到对分享着资源的充分利用。和以往的方案相比,这些方案要求更低的通讯和计算成本;且更加合理和容易实施。 A new method to the secret sharing scheme with the function of assignment was proposed, in which the circumstance of finite secrets to share was considered. To demonstrate this method, two schemes are provided. The first scheme is realized by introducing a concept of "share vector", the second scheme ameliorates the first scheme by introducing the concept of "secret shift", in which the resource of shareholders is fully used. In contrast with the early one, these schemes require less cost of communication and computation.
出处 《微电子学与计算机》 CSCD 北大核心 2007年第3期111-112,116,共3页 Microelectronics & Computer
基金 华北电力大学青年教师基金项目(200521001)
关键词 密码学 门限秘密共享 指派方案 碎片向量 cryptography threshold secret sharing assignment scheme share vector
  • 相关文献

参考文献8

二级参考文献29

  • 1谢凡荣.求解指派问题的一个算法[J].运筹与管理,2004,13(6):37-40. 被引量:13
  • 2(美)Bruce Schncier 吴世忠 等译.应用密码学——协议、算法与C源程序[M].机械工业出版社,2000..
  • 3Chaum D. Blind Signatures Systems. Advances in Cryptology CRYPTO'83. Plenum, 1983:153.
  • 4Elsayed Mohammed, Emarah A E, E1-Shennawy Kh. A Blind Signature Scheme Based on Elgamal Signature.2002.
  • 5Nan-Yih Lee, Tzonelih H wang. On the Security of Fair Blind Signature Scheme Using Oblivious Transfer[J]. Computer Communications, 1999, (22):287-290.
  • 6钱颂迪 顾基发 等.运筹学[M].清华大学出版社,1990..
  • 7Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612~613.
  • 8Blakley G R. Safeguaring cryptographic keys. Proc. AFIPS National Computer Conference, New York, 1979. 313~317.
  • 9Feldman P. A practical scheme for non-interactive verifiable secret sharing. Proc. 28th IEEE Symposium on Foundations of Computer Science, IEEE Computer Society, 1987. 427~437.
  • 10Pedersen T P. Distributed provers and verifiable secret sharing based on the discrete logarithm problem. Ph. D.thesis, Aarhus University, Computer Science Department , Aarhus , Denmark, 1992.

共引文献18

同被引文献11

  • 1叶振军,孟繁桢.Special secret sharing scheme with the function of assignment[J].Journal of Systems Engineering and Electronics,2005,16(3):651-653. 被引量:3
  • 2Ye Zhenjun,Meng Fanzhen.Secret sharing scheme with inherited characteristic[J].Journal of Systems Engineering and Electronics,2006,17(4):916-918. 被引量:1
  • 3Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 4Blakley G R. Safeguaring cryplographic keys[C]//Proc, of AFIPS National Computer Conference, New York, 1979 : 313 - 317.
  • 5Gray R. Agent Tel: a flexible and secure mobile agent system [D]. Hanover: Dartmouth College, 1997.
  • 6Feldman P. A practical scheme for non-interactive verifiable secret sharing[C]//Proc, of 28th IEEE Symposium on Founda tions of Computer Science, IEEE Computer Society, 1987 :427 - 437.
  • 7Pedersen T P. Non-interactive and information-theoretic secure verifiable secret sharing [ C ] // Advances in Cruptology- CRYPTO, Lecture Notes in Computer Science, Berlin, 1992, 576:129 - 140.
  • 8Schoenmakers B. A simple publicly verifiable secret sharing scheme and its applications to electronic voting[C]//CRYPTO, Springer Verlag, 1999: 32 - 46.
  • 9Herzberg A, Jarecki S, Krawczyk H, et al. Proactive secret sharing or: how to cope with perpetual leakage[C]//Proc, of CRYPTO, Spring Verlag LNCS, 1996 : 339 - 352.
  • 10Laszlo Csirnaz. Secret sharing schemes on graphs[J].Studia Mathematica, 2007, 44(3):297 - 306.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部