期刊文献+

基于证书的可验证多秘密共享方案 被引量:3

Verifiable multi-secret sharing scheme based on certificate
下载PDF
导出
摘要 提出了基于证书的可验证多秘密共享方案,不仅可以同时验证庄家和参与成员的诚实性,而且不需要安全信道为参与者传递秘密信息。该方案还具备在同一组分享者中可共享任意多个秘密,且参与者只需使用同一个子秘密就可恢复任意多组秘密的特点。当有新的参与者加入时,庄家只需公布一个由多项式函数计算出来的公开值,不需要更改已有参与者的信息。 This paper presents a Verifiable Multi-secret Sharing Scheme (VMSS) based on certificate.It cannot only verify the honesty of the dealer and participants at the same time,but also needn't safe channel to send secret shares.Another property of the scheme is that arbitrary number of secrets can be shared in a group of participants.Additionally each participant can use the same share to reconstruct arbitrary number groups of secrets.When a new member would like to enter,the dealer mustn't change the information of existing members,but publish an open value computed by polynomial function.
作者 白晓 余梅生
出处 《计算机工程与应用》 CSCD 北大核心 2009年第7期127-128,163,共3页 Computer Engineering and Applications
关键词 证书 可验证秘密共享 可验证多秘密共享 拉格朗日插值多项式 certificate Verifiable Secret Sharing (VSS) Verifiable Multi-secret Sharing Scheme ( VMSS ) Lagrangc interpolation polynomial
  • 相关文献

参考文献8

  • 1Shamir A.How to share a secret[J].Communications of the ACM, 1979,22( 11 ) : 612-613. 被引量:1
  • 2Hwang R J,Lee W B,Chang C C.A concept of designing cheater identification methods for secret sharing[J].Journal of Systems and Software, 2000,46( 1 ) :7-11. 被引量:1
  • 3石润华,黄刘生.一种简单的可验证秘密共享方案[J].计算机应用,2006,26(8):1821-1823. 被引量:7
  • 4唐春明,刘卓军,王明生.一种实用的可验证秘密共享方案[J].计算机工程与应用,2006,42(15):129-133. 被引量:5
  • 5许春香..安全秘密共享及其应用研究[D].西安电子科技大学,2003:
  • 6Chien H Y,Jan J K,Tseng Y M.A practical (t,n) muhi-secret sharing scheme[J].IEICE Transaction Fundamentals, 2000,83 (12) : 2762-2765. 被引量:1
  • 7Sun H.On-line multiple secret sharing based on a one-way function[J].Computer Communications, 1999,22(8) :745-748. 被引量:1
  • 8Dehkordi M H,Mashhadi S.An efficient threshold verifiable multisecret sharing[J].Computer Standards & Interfaces,2008,30:187-190. 被引量:1

二级参考文献22

  • 1F Boudot.Efficient Proofs that a Committed Number Lies in an Interval[C].In:Advances in Cryptology-EUROCRYPT'00,2000;431-444 被引量:1
  • 2S Goldwasser,S Micali,C Rackoff.The Knowledge Complexity of Interactive Proof Systems[J].SIAM J Comput, 1989; 18 : 186-208 被引量:1
  • 3S C Kothari.Generalized Linear Threshold Scheme[C].In :Proceeding of CRYPTO'84,1984:231-241 被引量:1
  • 4O Goldreich.Foundations of Cryptography(Basic Tools)[M].Cambridge University Press, 2001 被引量:1
  • 5P Feldman.A Practical Scheme for Non-interactive Verifiable Secret Sharing[C].In:Proceedings of the 28 IEEE Symposium on Foundation of Computer Science(FOCS),IEEE, 1987:427-437 被引量:1
  • 6T P Pedersen.Non-interactive and information-theoretic secure,verifiable secret sharing[C].In:Advances in Cryptology-CRYPTO'91,1992:129-140 被引量:1
  • 7A Shamir.How to Share a Secret[J].Comm ACM,1979;22:612-613 被引量:1
  • 8G R Blakey.Safeguarding Cryptographic Keys[J].Proc NCC, 1979;48:313-317 被引量:1
  • 9M Ben-Or,S Goldwasser,A Wigderson.Completeness theorems for noncryptographic fault-tolerant distributed computation[C]. In: 20th Annual Symposium on the Theory of Computing, 1988; 1-10 被引量:1
  • 10B Chor,S Goldwasser,S Micali et al.Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Fauhs[C].In:proceedings of the 26 IEEE Symposium on Foundation of Computer Science(FOCS),IEEE, 1985: 383-395 被引量:1

共引文献8

同被引文献25

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部