期刊文献+

一种可验证的多组织多秘密共享方案

A verifiable multi-organization multi-secret sharing scheme
在线阅读 下载PDF
导出
摘要 利用Shamir门限体制的思想提出了一种可验证的多组织多秘密共享方案.该方案能保证重要信息和秘密数据的安全存储、传输及合法利用.在该方案中,主要的构造方法用到了Lagrange插值多项式和数论的知识,验证阶段用到了离散对数的一些知识,在计算上较为复杂.通过对这些数学知识的运用,每个参与者在秘密恢复阶段为了防止其他参与者进行欺诈,能验证其他参与者提供的秘密份额是否有效.方案的安全性是基于离散对数的难解性.经分析说明该方案证实是安全可行的,具有一定的应用价值. A verifiable multi-organization multi-secret sharing scheme is proposed,which is based on the idea of Shamir threshold system.It is extension of Shamir threshold scheme.The scheme can ensure the secure storage of important information and secret data,transmission and the legal utilization.In this scheme,the main construction method used in the Lagrange interpolation polynomial and number theory of knowledge,validation phase uses some knowledge of discrete logarithm,which is more complicated in the calculation.Through the use of these mathematical knowledges,each participant in the secret recovery phase can verify the validity of the secret share of the other participants provided for preventing the other participants from cheating,The program's security is based on the intractability of discrete logarithm.After the final analysis,the program is proved to be feasible and safe.
作者 史恰 杜伟章
出处 《长沙理工大学学报(自然科学版)》 CAS 2011年第1期70-73,共4页 Journal of Changsha University of Science and Technology:Natural Science
关键词 Shamir门限体制 可验证 多组织多秘密 离散对数 Shamir threshold system verifiability multi-organization multi-secret discrete logarithm
  • 相关文献

参考文献13

  • 1A Shamir. How to share a secret[J]. Communications of the ACM,1979,22(11):612-613.
  • 2Blakley G R. Safeguarding cryptographic keys[A]. Proceedings of the 1979 National Computer Conferenee[C]. New York : AFIPS Press, 1979 : 313-317.
  • 3石润华,黄刘生.一种简单的可验证秘密共享方案[J].计算机应用,2006,26(8):1821-1823. 被引量:7
  • 4唐春明,刘卓军,王明生.一种实用的可验证秘密共享方案[J].计算机工程与应用,2006,42(15):129-133. 被引量:5
  • 5Yang Chouehen, Chang Tingyi, Hwang Minshiang. A (t,n) multi-secret sharing scheme [J]. Applied Mathematics and Computation, 2004, 151 (2) : 483- 490.
  • 6Zhao Jianjie,Zhang Jianzhong, Zhao Rong. A practical verifiable mulit-seeret sharing seheme[J]. Computer Standards and Interfaces, 2007, 29 ( 1 ) : 138- 141.
  • 7Shao Jun,Cao Zhenfu. A new efficient (t,n) verifiable multi-secret sharing (VMSS), based on YCH scheme[J]. Applied Mathematics and Computation, 2005,168(1) : 135-140.
  • 8Yang Chouchen, Chang Tingyi, Hwang Minshiang. A (t,n) multi-secret sharing seheme[J]. Applied Mathematics and Computation, 2004, 151 (2) : 483-490.
  • 9Pang L J,Wang Y M. A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing[J]. Applied Mathematics and Computation, 2005, 167 (2):840-848.
  • 10Dehkordi M H, Mashhadi S. An efficient threshold verifiable multi-secret sharing[J]. Computer Standards and Interfaces,2008,30(3) : 187-190.

二级参考文献41

  • 1唐春明,刘卓军,王明生.一种实用的可验证秘密共享方案[J].计算机工程与应用,2006,42(15):129-133. 被引量:5
  • 2石润华,黄刘生.一种简单的可验证秘密共享方案[J].计算机应用,2006,26(8):1821-1823. 被引量:7
  • 3Shamir A.How to share a secret[J].Communications of the ACM, 1979,22( 11 ) : 612-613.
  • 4Hwang R J,Lee W B,Chang C C.A concept of designing cheater identification methods for secret sharing[J].Journal of Systems and Software, 2000,46( 1 ) :7-11.
  • 5Chien H Y,Jan J K,Tseng Y M.A practical (t,n) muhi-secret sharing scheme[J].IEICE Transaction Fundamentals, 2000,83 (12) : 2762-2765.
  • 6Sun H.On-line multiple secret sharing based on a one-way function[J].Computer Communications, 1999,22(8) :745-748.
  • 7Dehkordi M H,Mashhadi S.An efficient threshold verifiable multisecret sharing[J].Computer Standards & Interfaces,2008,30:187-190.
  • 8Berlekamp E R,McEliece R J,Van Tilborg H C A.On the inherent intractability of certain coding problems[J].IEEE Transactions on Information Theory,1978,24(3):384-386.
  • 9McElience R J.A public-key cryptosystem based on algebraic coding theory[R].USA:Jet Propulsion Lab,1978.
  • 10Niederreiter H.Knapsack-type crypto-systems and algebraic coding theory[J].Problems of Control and Information Theory,1986,15(2):159-166.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部