期刊文献+

一种可验证的矢量空间动态密钥共享方案 被引量:1

A publicly verifiable vector space secret sharing scheme
在线阅读 下载PDF
导出
摘要 提出了一种可验证的矢量空间密钥共享方案,其安全性依赖于椭圆曲线密码的安全性。该方案具有如下特点:使(t,n)门限密钥共享方案中受托人的权限必须相同的前提条件可以推广到一般的情况;提供了验证的手段,可以检验出密钥分发者或密钥受托人的欺诈行为;分发的子密钥通过椭圆曲线密码进行了加密,使得受托人掌握的子密钥是加密后的密文形式,增强了安全性;同时,由于椭圆曲线密码体制具有加密强度高、密钥短的优点,使得该方案特别适合于计算、存储、带宽要求严格的场合。 A verifiable vector space secret sharing scheme is proposed, whose security relies on the security of Elliptic Curve Cryptography (ECC). This scheme is characterized as follows. The precondition of (t, n)-threshold secret sharing scheme that all assignees' purview must be the same is generalized. A verifiable infrastructure is provided, which can be used to detect the cheaters from dealers and assignees. The shared key distributed by the dealer is encrypted based on ECC to enhance the security. Meanwhile the length of the key of ECC is much shorter than that of RSA cryptography. So the computation cost and communication cost of the proposed scheme are lower, which are valuable in applications with limited memory volume and communication bandwidth.
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2008年第1期123-126,共4页 Journal of Jilin University:Engineering and Technology Edition
基金 “十五”国家科技攻关计划项目(2004BA907A20) 吉林省重大科技计划项目(20040304)
关键词 计算机系统结构 密钥共享 椭圆曲线 矢量空间 椭圆曲线离散对数问题 computer systems organization secret sharing elliptic curve cryptography (ECC) vector space elliptic curve discrete logarithm problem (ECDLP)
  • 相关文献

参考文献12

二级参考文献47

  • 1[1]W Diffie, M Hellman. New directions in cryptography [ J ].IEEE Transactions on Information Theory, 1976, 22: 644-654.
  • 2[2]T Matsumoto, Y Takashima, H Imai. On seeking smart publickey distribution systems [J] .The Transactions of the IECE of Japan, 1986, E69: 99 - 106.
  • 3[3]L Law,A Menezes,M Qu,J Solinas,S Vanstone. An efficient protocol for authenticated key agreement [ J/OL ]. http://www. cacr. math. uwaterloo. ca/, 2004.
  • 4[4]National Security Agency. SKIPJACK and KEA algorithm specification [J/OL] .http://csrc. nist. gov/encryption/skipjack-kea. htm, 1998.
  • 5[5]R Ankey, D Johnson, M Matyas. Unified model [J/OL].http://www. kisa. or. kr/technology/sub1/UnifiedModel.htm, 2004.
  • 6[6]S Blake-Wilson, D Johnson, A Menezes. Key agreement protocols and their security analysis [ A]. Proceedings of the sixth IMA international conference on cryptography and coding,LNCS 1355[C]. Springer-Verlag, 1997.30 - 45.
  • 7MingHuaQu ScottVanstone.OnID-BasedCryptosystemsoverZn[R]..成都:庆贺柯召院士九十寿辰暨国际数论学术研讨会上的报告[C].,2000.13-26.
  • 8朱文余 孙琦.环Zn上椭圆曲线及数字签名方案.电子与信息学报(原电子科学学刊),2003,25(1):40-40.
  • 9孙琦 张起帆 彭国华.计算群元的整数倍的一种算法及其在公钥密码体制中的应用[A]..密码学进展-ChinaCrypt2002.第七届中国密码学学术会议论文集[C].北京:电子工业出版社,.117-124.
  • 10W Diffie, M E Hellman. New directions in cryptography [J]. IEEE.Transactions on Information Theory, 1976,22(6) :644 - 654.

共引文献104

同被引文献11

  • 1董攀,况晓辉,卢锡城.一种秘密共享新个体加入协议(英文)[J].软件学报,2005,16(1):116-120. 被引量:16
  • 2Shamir A.How to share a secret[J].Communication of the ACM,1979,22(11):612-613.
  • 3Blakley G R.Safeguarding cryptographic key[C]//Proceedings of AFIPS National Computer Conference.New York:AFIPS,1979,48:313-317.
  • 4Yang C C,Chang T Y,Hwang M S.A (t,n) multi-secret sharing scheme[J].Applied Mathematics and Computation,2004,151(2):483-490.
  • 5Pang L J,Wang Y M.A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing[J].Applied Mathematics and Computation,2005,167 (2):840-848.
  • 6Pedersen T P.Non-interactive and information-theoretic secure verifiable secret sharing[C]//Advances in Cryptology-Crypto' 91 Proceedings.Berlin:Springer-Verlag,1991:129-140.
  • 7Brickell E F.Some ideal secret sharing schemes[C]//Advancecin Cryptology EUROCRYPT'89 Proceedings.Berlin:SpringerVerlag,1990:468-475.
  • 8Li Xiao,He Mingxing-A protocol of member-join in a secret sharing scheme[C]//Proc of the 2th Information Security Practice and Experience.Berlin:Springer-Verlag,2006:134-141.
  • 9王锋,张建中.一种新的可验证的秘密共享新个体加入协议[J].计算机工程与应用,2007,43(28):122-124. 被引量:4
  • 10许春香,陈恺,肖国镇.安全的矢量空间秘密共享方案[J].电子学报,2002,30(5):715-718. 被引量:23

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部