期刊文献+

可验证的Asmuth-Bloom秘密共享方案 被引量:2

The Asmuth-bloom Verifiable Threshold Sharing Scheme
在线阅读 下载PDF
导出
摘要 针对现有基于中国剩余定理的可验证秘密共享方案存在的问题,结合模运算与同余性质构造了一个可验证Asmuth-Bloom秘密共享方案,并分析了方案的正确性和安全性.该方案在计算秘密份额的过程中,将生成的额外数据以离散对数的形式公开作为验证信息.参与者利用验证信息可以验证秘密份额的有效性,不仅能防止秘密分发者的欺骗,而且能够检测参与者之间的相互欺诈. In succession, Aiming at the existing problems of verifiable secret schemes based on Chinese Remainder Theorem, a verifiable Asmuth - Bloom secret sharing scheme is constructed. Then the validity and security of the scheme are analyzed. In the process of computing shares, some additional data are generated as the verify information which are opened to all participants in the form of discrete logarithm. Participants can verify the correctness of shares by using public verifying information. Consequently, the scheme can not only detect fraud amon~ the Participants but also Prevent dealer's e, hentin~ h^h~vinr
作者 于洋 刘焕平
机构地区 哈尔滨师范大学
出处 《哈尔滨师范大学自然科学学报》 CAS 2012年第3期20-23,共4页 Natural Science Journal of Harbin Normal University
关键词 中国剩余定理 Asmuth—Bloom秘密共享方案 验证 Chinese remainder theorem Asmuth -Bloom secret sharing scheme Verification
  • 相关文献

参考文献7

  • 1Shamir A. How to share a secret [ J ]. Communication of the ACM, 1979, 22(11) : 612 -613.
  • 2Blakley G R. Safeguarding cryptographic key [ A ]. Proceed- ings of AFIPS, 1979 National Computer Conference[ C ]. New York : AFIPS, 1979,48 : 313 - 317.
  • 3Asmuth C A , Bloom J. A modular approach to key safeguard- ing [ J ]. IEEE Transactions on Information Theory IT -29, 1983, 208 - 210.
  • 4Ore O. The general Chinese remainder theorem [ J]. American Mathematical Monthly, 1952:9:365 - 370.
  • 5唐春明,刘卓军,王明生.一种实用的可验证秘密共享方案[J].计算机工程与应用,2006,42(15):129-133. 被引量:5
  • 6庞辽军,李慧贤,王育民.可验证的(t,n)门限秘密共享方案及其安全性[J].华南理工大学学报(自然科学版),2007,35(1):102-105. 被引量:3
  • 7Mignotte M. How to share a secret? [J] In: Proc. of the Workshop on Cryptography, Springer. Heidelberg, 1983 : 371 - 375.

二级参考文献14

  • 1李慧贤,程春田,庞辽军.一般访问结构上的多秘密共享方案[J].华南理工大学学报(自然科学版),2006,34(6):95-98. 被引量:3
  • 2F Boudot.Efficient Proofs that a Committed Number Lies in an Interval[C].In:Advances in Cryptology-EUROCRYPT'00,2000;431-444
  • 3S Goldwasser,S Micali,C Rackoff.The Knowledge Complexity of Interactive Proof Systems[J].SIAM J Comput, 1989; 18 : 186-208
  • 4S C Kothari.Generalized Linear Threshold Scheme[C].In :Proceeding of CRYPTO'84,1984:231-241
  • 5O Goldreich.Foundations of Cryptography(Basic Tools)[M].Cambridge University Press, 2001
  • 6P Feldman.A Practical Scheme for Non-interactive Verifiable Secret Sharing[C].In:Proceedings of the 28 IEEE Symposium on Foundation of Computer Science(FOCS),IEEE, 1987:427-437
  • 7T P Pedersen.Non-interactive and information-theoretic secure,verifiable secret sharing[C].In:Advances in Cryptology-CRYPTO'91,1992:129-140
  • 8A Shamir.How to Share a Secret[J].Comm ACM,1979;22:612-613
  • 9G R Blakey.Safeguarding Cryptographic Keys[J].Proc NCC, 1979;48:313-317
  • 10M Ben-Or,S Goldwasser,A Wigderson.Completeness theorems for noncryptographic fault-tolerant distributed computation[C]. In: 20th Annual Symposium on the Theory of Computing, 1988; 1-10

共引文献6

同被引文献13

  • 1沈忠华,于秀源.一个无可信中心的有向门限签名方案[J].杭州师范学院学报(自然科学版),2006,5(2):95-98. 被引量:2
  • 2Shamir A.How to Share a Secret[J].Communications of ACM,1979,22(11):612-613.
  • 3Blakley G R.Safeguarding Cryptographic Keys[C]//Proceedings of National Computer Conference.Arlington,USA:[s.n.],1979:313-317.
  • 4Feldman P.A Practical Scheme for Non-interactive Verifiable Secret Sharing[C]//Proceedings of the 28th IEEE Symposium on Foundations of Computer Science.[S.1.]:IEEE Computer Society,1987:427-437.
  • 5Pedersen T P.Non-interactive and Information-theoretic Secure Verifiable Secret Sharing[C]//Proceedings of the11th Annual International Cryptology Conference on Advances in Cryptology.[S.1.]:IEEE Press,1991:129-140.
  • 6Harn L.Group-oriented(t,n)Threshold Digital Signature Scheme and Digital Multisignature[J].IEEE Proceedings of Computers and Digital and Techniques,1994,141(5):307-313.
  • 7Asmuth C A,Bloom J.A Modular Approach to Key Safeguarding[J].IEEE Transactions on Information Theory,1983,29(2):208-210.
  • 8Li Qiong,Wang Zhifang,Niu Xiamu,et,al.A Aoninter-active Modular Verifiable Secret Sharing Scheme[C]//Proceedings of International Conference on Communi-cations,Circuits and Systems.Los Alamitos,USA:[s.n.],2005:84-87.
  • 9Iftene S.Secret Sharing Schemes with Applications in Security Protocols[D].[S.1.]:University Alexandru,2007.
  • 10Kaya K,Selcuk A A. A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem [ C ]// Proceedings of the 9th Annual International Conference on Cryptology. Kharagpur,India: [ s. n. ] ,2008:414-425.

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部