期刊文献+

不需要安全信道的空间有效秘密分享方案 被引量:2

A New Space Efficient Secret Sharing Scheme without a Secure Channel
在线阅读 下载PDF
导出
摘要 高效的秘密分享方案在保护加解密密钥、门限密码系统、多方安全协议等方面发挥着重要作用.文中主要考虑空间有效的秘密分享问题.作者提出一个新的不需要安全信道的空间有效秘密分享方案.方案构造简捷、运行高效,并且在分发者和参与者之间发送信息不需要秘密信道的支持.文中给出了对新方案的安全性和性能的分析,同时给出了方案的工作流程图和一个简单的示例.由于安全性和性能方面的优点,新方案可广泛应用于诸如长期档案安全存储系统、资源受限环境(传感器网络、移动网络等)下机密信息的保护等方面. Efficient secret sharing schemes play significant roles in areas such as safe guarding cryptographic keys, threshold cryptosystems, and secure multi-party protocols, etc. This paper focuses on the problem of space efficient secret sharing. We propose a space efficient secret sharing scheme without using private channels. The new scheme enjoys a simple construction and high efficiency. It does not require secure channels between the dealer and the share holders. The security analysis and performance analysis of the new construction are presented. We also give the execution flow chart and a very simple example to demonstrate how our secret sharing scheme works. Due to its security and performance features, the new scheme can be extensively applied in Long-Term archival storage system, and the safe guarding of very confidential information in resource constrained environments such as sensor networks and mobile networks, etc.
出处 《计算机学报》 EI CSCD 北大核心 2012年第9期1816-1822,共7页 Chinese Journal of Computers
基金 国家自然科学基金(61170298) 江苏省自然科学基金(BK2011101)资助~~
关键词 秘密分享 空间有效秘密分享 秘密信道 离散对数 secret sharing space efficient secret sharing private channel discrete logarithm
  • 相关文献

参考文献22

  • 1Blakley G R. Safeguarding cryptographic keys//Proceedings of the AFIPS 1979 National Computer Conference. New York, 1979:313-317.
  • 2Shamir A. How to share a :secret. Communications of the ACM, 1979, 22(11): 612-613.
  • 3Harn L. Efficient sharing (broadcasting) of multiple secrets. IEEE Proceedings Computers and Digital Techniques, 1995, 142(3) : 237-240.
  • 4Chien H Y,Jan J K, Tseng Y M. A practical (t,n) multi secret sharing scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2000, E83 A(12): 2762- 2765.
  • 5Pang L J, Wang Y M. A new (t,n) multi-secret sharing scheme based on Shamir' s secret sharing. Applied Mathe matics and Computation, 2005, 167(2): 840-848.
  • 6Yang C C, Chang T Y, Hwang M S. A (t,n) multi-secret sharing scheme. Applied Mathematics and Computation, 2004, 151(2): 483-490.
  • 7Li Huixian, Cheng Chentian, Pang Liaojun. A new (t,n) threshold multi-secret sharing scheme//Lecture Notes in Artificial Intelligence. Berlin: Springer-Verlag, 2005: 421-426.
  • 8Li Huixian, Pang Liaojun, Cai Wandong. An efficient threshold multi-group-secret sharing scheme//Proceedings of the 2nd International Conference on Fuzzy Information and Engineering. Heidelberg, 2007:911-918.
  • 9Chan Chao-Wen, Chang Chin-Chen. A scheme for threshold multi-secret sharing. Applied Mathematics and Computation, 2005, 166(1):1-14.
  • 10Schneier Bruce. Schneier's Cryptography Classics Library: Applied Cryptography, Secrets and Lies, and Practical Cryp- tography. USA: Wiley, 2007.

同被引文献11

  • 1徐仲,张凯远,陆权,等.矩阵论简明教程[M].2版.北京:科学出版社.2005:114-118.
  • 2SHAMIR A. How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 3BLAKLEY G R. Safeguarding cryptographic keys[C] //Proc of AFIPS National Computer Conference. 1979:313-317.
  • 4MINOWA T,TAKAHASHI T. Secure distributed storage for bulk data[J].Lecture Notes in Computer Science,2012,7667(1):576-583.
  • 5PARAKH A,KAK S. Space efficient secret sharing[C] //Proc of the 4th Annual Computer Science Research Conference. 2009.
  • 6YANG Xiao-yuan,LIU Zhen,ZHANG Wei,et al. A high efficiency data distribution algorithm in distributed storage[C] //Proc of the 5th International Conference on Information Assurance and Security. 2009:627-630.
  • 7ZHAO Da-wei,PENG Hai-ping,WANG Cong,et al. A secret sharing scheme with a short share realizing the threshold and the adversary structure[J].Computer &Mathematics with Applications,2012,64(4):611-615.
  • 8PANG Liao-jun,WANG Yu-min. A new (t,n) multi-secret sharing scheme based on Shamir’s secret sharing[J].Applied Mathema-tics and Computation,2005,167(2):840-848.
  • 9KOBLITZ N. Elliptic curve cryptosystems[J].Mathematics of Computation,1987,48(177):203-209.
  • 10WANG Shiuh-jeng.Direct construction of a secret in generalized group oriented cryptography[J].Computer Standards and Interfaces,2004,26(5):455-460.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部