期刊文献+

一种有效的可验证的门限多秘密分享方案 被引量:5

Efficient and verifiable threshold multi-secret sharing scheme
下载PDF
导出
摘要 针对多数秘密共享方案不能同时防止秘密管理者和秘密成员的欺骗,以及子秘密重构时计算量大等问题,提出了一种安全有效的解决方案。在该方案中,每个分享者只需拥有一个秘密影子就可以和其它分享者共享多个秘密信息,此外,方案提供了有效抵御秘密管理者欺骗和成员欺骗的解决方法。方案的安全性是基于求离散对数和RSA大整数因式分解的困难性。与其它已有的方案相比,此方案的优点在于计算量低和子秘密重构时采用了并行算法。 Most previous secret sharing schemes have some problems in which the schemes can not deter the cheating of the dealer and secret shadowholders simultaneously, and the computation in a secret recovery is overhead. A secure and efficient solving scheme was proposed. Each participant can share many secrets with other participants by holding only one shadow in the proposed scheme. This new scheme provides efficient solutions against cheating of the dealer and cheating of any participant. The security of the proposed scheme is based on the difficulty of computing the discrete logarithm modulo for a composite number and the factorization problem of a large integer. Compared with the other existing schemes, the proposed scheme has the advantages of lower computation and the parallel reconstruction in a secret recovery phase.
出处 《计算机工程与设计》 CSCD 北大核心 2005年第8期1994-1996,共3页 Computer Engineering and Design
基金 国家自然科学基金项目(60173041) 广东省科技基金项目(20041190067)
关键词 密码学 秘密共享 因式分解 离散对数 欺骗 cryptography secret sharing factorization discrete logarithm cheating
  • 相关文献

参考文献11

  • 1Tompa M, Woll H. How to share a secret with cheaters[J]. J Cryptol, 1988,(1):133-138. 被引量:1
  • 2Wu C T, Wu S T. Cheating detection and cheater identification in secret sharing schemes[J]. IEEE Proc,Comput Dig Tech, 1995,142 (5):367-369. 被引量:1
  • 3Hwang R J, Lee W B, Chang C C. A concept of designing cheater identification methods for secret sharing[J].Journal of systems and software, 2000,46(1):7-11. 被引量:1
  • 4Chang C C, Hwang R J. Efficient cheater identification method for threshold schemes[J]. IEEE Proc, Comput Digit Tech, 1997,144(1):23-27. 被引量:1
  • 5费如纯,王丽娜.基于RSA和单向函数防欺诈的秘密共享体制[J].软件学报,2003,14(1):146-150. 被引量:41
  • 6Chien H Y, Jan J K, Tseng Y M. A practical (t,n) multi-secret sharing scheme[J].IEICE Transaction Fundamentals, 2000, E83-A(12):2762-2765. 被引量:1
  • 7Sun H. On-line multiple secret sharing based on a one-way function[J] .Computer communications, 1999, 22(8):745-748. 被引量:1
  • 8Harn L. Efficient sharing (broadcasting) of multiple secrets[J].IEEE Proc, Comput Dig Tech 1998, 142(3):237-240. 被引量:1
  • 9Chen L, Gollmann D, Mitchell C J, et al. Secret sharing with reusable polynomials[C]. Berlin: ACISP'98 Springer-Verlag, 1999.183-193. 被引量:1
  • 10甘元驹.Verifiable threshold signature schemes against conspiracy attack[J].Journal of Zhejiang University Science,2004,5(1):50-54. 被引量:21

二级参考文献4

共引文献63

同被引文献44

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部