期刊文献+

防欺骗(t,n)秘密共享模式研究 被引量:3

Resaerch of (t,n) secret sharing scheme against active cheating
下载PDF
导出
摘要 在以往的(t,n)秘密共享模式中,为了使接收者能够重构消息,n个验证者之间需要广播消息密文影子(shadow).本文提出了一种新的(t,n)秘密共享模式,在该模式中,验证者之间无需广播秘密影子,从而大大地减少了网络的通信量,提高了安全性.此外,该模式具有密钥和消息认证功能,不仅能够有效地抵抗假冒攻击,还能够识别验证者的欺骗行为. In existing encryption schemes with (t,n) secret shared control, n verifiers have to broadcast the shadows of message to each other in order to reconstruct the message. A new (t, n) secret sharing scheme is proposed, in which the verifiers don't need to broadcast the shadows of message to each other. Thus, this scheme can achieve higher security and reduce the traffic of network. Besides, the scheme provides the function of key and message au- thentication. It can not only prevent forging attacks, but also find the active cheating of any verifier.
出处 《浙江大学学报(理学版)》 CAS CSCD 北大核心 2007年第6期633-635,701,共4页 Journal of Zhejiang University(Science Edition)
基金 国家自然科学基金资助项目(10271040) 安徽省自然科学基金资助项目(00043115)
关键词 秘密共享 公钥认证 离散对数 门限 secret sharing public key authentication discrete logarithm threshold
  • 相关文献

参考文献10

  • 1SHAMIR A.How to share a secret[J].Communications of ACM,1979,24(11):612-613. 被引量:1
  • 2ASMUTH C,BLOOM J.A modular approach to key safeguarding[J].IEEE Transactions on Information Theory,1983,29(2):208-210. 被引量:1
  • 3SIMMONS G J.Geometric shares secret schemes and/or shared control schemes[C]∥Advances in Cryptology.EUROCRYPT'90 Proceedings.Berlin:Springer-Verlag,1991:216-241. 被引量:1
  • 4SIMMONS G J.An introduction to share secret and/or shared control schemes and their application[C]∥The Science of Information Integrity.New York:IEEE Press,1992:441-497. 被引量:1
  • 5HARN L.Digital signature with (t,n) shared verification based on discrete logarithms[J].Electron Lett,1995,31(3):177. 被引量:1
  • 6HSU C L,WU T C,Authenticated encryption scheme with (t,n) shared verification[J].IEE Proc-Comput Digit Tech,1998,145(2):117-120. 被引量:1
  • 7HAN Yi-lian,YANG Xiao-yuan,SUN Jun,et al.Verifiable threshold cryptosystems based on elliptic curve[J].Proceedings of the 2003 International Conference on Computer Network and Mobile Computing (ICCNMC'03),2003,10:334-337. 被引量:1
  • 8SURANJAN P,SHAMBHU U.A verifiable proactive secret sharing scheme in distributed systems[C]∥Proceedings IEEE Military Communications Conference.New York:IEEE Press,2003:826-831. 被引量:1
  • 9MICHAEL A M,FRED B S.A robust and secure secret distribution system[J].IEEE Transactions on Dependable and Secure Computing,2004,1(1):34-37. 被引量:1
  • 10谢琪.一类代理多重签名方案的密码学分析与改进[J].浙江大学学报(理学版),2006,33(2):139-141. 被引量:2

二级参考文献6

共引文献1

同被引文献15

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部