期刊文献+

具有前摄能力的可公开验证秘密共享 被引量:1

Publicly Verifiable Secret Sharing Scheme with Proactive Ability
在线阅读 下载PDF
导出
摘要 可公开验证秘密共享是一种特殊的秘密共享,由分发者分发的秘密份额不仅能被份额持有者自己验证,而且可以被其他任何成员验证。然而,对于一般的可公开验证秘密共享,敌手可能使用很长的时间才能攻破门限个份额服务器,获得秘密。为了解决这个问题,提出了第一个具有前摄能力的可公开验证的秘密共享方案,该方案不仅能够公开验证份额的正确性,而且具有份额定期更新的性质,比其它一般可公开验证秘密共享方案更安全,能够更好地满足各种应用的安全需求。 A publicly verifiable secret sharing(PVSS) scheme is a special secret sharing scheme in which the shares distributed by the dealer can be verified not only by shareholders themselves but also by any other party. However, in a normal publicly verifiable secret sharing scheme, an adversary may get the secret by attacking threshold shareholder servers for a long time. In order to deal with this problem,a publicly verifiable secret sharing scheme with proactive ability was newly proposed, which not only can publicly verify the validity of shares, but also has the property of periodically renewing shares. This makes the proposed scheme more secure than other common publicly verifiable secret sharing schemes, and makes it better satisfy security demand of various application
出处 《计算机科学》 CSCD 北大核心 2010年第6期125-127,共3页 Computer Science
基金 国家自然科学基金资助项目(60703089) 山东省自然科学基金资助项目(ZR2009GQ008) 山东省教育厅科技计划项目(J08LJ02)资助
关键词 秘密共享 门限方案 可公开验证 前摄性 Secret sharing, Threshold scheme,Publicly verifiable scheme,Proactive property
  • 相关文献

参考文献6

  • 1Shamir A. How to share a secret[J].Communications of the ACM,1979:612.
  • 2Blakley G R. Safeguarding cryptographic keys [C] // Proc. of National Computer Conference. Montvale NJ, AFIPS, 1979.
  • 3Feldman P. A Practical Scheme for Non-Interactive Verifiable Secret Sharing [C]//Proc. of the 28^th IEEE Symposium on the Foundations of Computer Science. California, USA, 1987.
  • 4Stadler M. Publicly verifiable secret sharing [C]// Advances in Cryptology-EUROCRYPT' 96. Saragossa, Spain, 1996.
  • 5Herzberg A,Jarecki S, Krawczyk H, et al. Proactive secret sharing[C]//Advances in Crytptolgy-Crypto ' 95. California, USA, 1995.
  • 6于佳,郝蓉,孔凡玉,李绪亮.先动的可公开验证服务器辅助秘密共享[J].北京邮电大学学报,2008,31(5):13-17. 被引量:7

二级参考文献9

  • 1张劼,刘振华,温巧燕.欺骗免疫秘密共享[J].北京邮电大学学报,2005,28(4):83-86. 被引量:6
  • 2郭奋卓,高飞,温巧燕,朱甫臣.一个基于Bell态的高效量子秘密共享协议[J].北京邮电大学学报,2005,28(6):120-122. 被引量:4
  • 3Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 4Blakley G R. Safeguarding cryptographic keys [ C] // AFIPS 1979 National Computer Conference. New York: AFIPS, 1979.. 313-317.
  • 5Feldman P. A pratical scheme for non-interactive verifiable secret sharing[C]//28th Annual FOCS. New York: IEEE; Press, 1987: 427-437.
  • 6Stadler M. Public verifiable secrel sharing[C]//Cryptology-EUROCRYPT'96. Berlin: Springer- Verlag, 1996: 190-199.
  • 7Herzberg A, Jarecki S, Krawczyk H, et al. Proactive secret sharing, or: how to cope with perpetual leakage[C] // Crytptolgy-Crypto ' 95. [ S. l. ] : Springer-Verlag, 1995 : 339-352.
  • 8Yang J, Rhee K, Sakurai K. A proactive secret sharing for server assisted threshold signatures[ C]//HPCC 2006. Berlin: Springer-Verlag, 2006: 250-259.
  • 9戴元军,马春光,杨义先.一种改进的基于拉格朗日插值的(t,n)门限秘密共享[J].北京邮电大学学报,2004,27(2):24-28. 被引量:7

共引文献6

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部