期刊文献+

一种有效的(t,n)门限可验证多密钥共享方案 被引量:2

An efficient scheme for (t,n) threshold verifiable multi-secret sharing
下载PDF
导出
摘要 YCH方案是一个基于二元单向函数和Shamir(t,n)门限方案的有效多密钥共享方案.以YCH方案为基础,基于可验证的秘密共享技术,采用新的子影子密钥构造方式,提出一种新的可验证多密钥共享方案,此方案能检测到密钥服务器或者合作成员可能存在的欺诈行为,而且与已有的方案相比,在多数情况下该方案效率更优. Based on the verifiable secret sharing scheme presented in 2005, a new verifiable multi-secret sharing scheme is presented via a novel method to construct sub-shadow keys on the basis of the YCH multi-secret sharing scheme in this paper. The analysis shows that new scheme can detect cheating behavior from the dealer or the cooperating participants. The new scheme performs better than existing schemes in most cases.
作者 王斌 宋朝霞
出处 《扬州大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第3期70-73,共4页 Journal of Yangzhou University:Natural Science Edition
关键词 门限方案 多密钥共享 可验证密钥共享 threshold scheme multi-secret sharing verifiable secret sharing
  • 相关文献

参考文献11

  • 1SHAMIR A. How to share a secret [J]. Commun ACM, 1979, 22(11):612-613. 被引量:1
  • 2HARN L. Efficient sharing (broadcasting) of muhiple secret [J]. lEE Proc Comput Digit Tech, 1995, 142(3): 237- 240. 被引量:1
  • 3CHIEN H Y, JAN J K,TSENG Y M. A practical (t, n) multi secret sharing scheme [J]. IEICE Trans on Fundamentals, 2000, 83(12):2762- 2765. 被引量:1
  • 4YANG Chou chen, CHANG Ting yi, HWANG Min-shiang. A (t, n) multi-secret sharing scheme [J]. Appl Math Comput, 2004, 151(2) :483- 490. 被引量:1
  • 5TOMPA M, WOLI. H. How to sharea secret with cheaters [J]. J Cryptology, 1988, 1(2): 133-138. 被引量:1
  • 6CHOR B, GOLDWASSER S, MICALI S, et al. Verifiable secret sharing and achieving simultaneity in presence of faults [C]// FEIGENBAUM J. Proc of the 26th IEEE Symposium on the Foundations of Computer Science. New York: Springer-Verlag, 1985:383-395. 被引量:1
  • 7PEDERSEN T P. Non interactive and information theoretic secure verifiahle secret sharing [C]// FEIGENBAUM J. Proc of the llth Annual International Cryptology Conference on Advances in Cryptology. Santa Barbara, California, USA: Lecture Notes in Computer Science, 1991, 576:129- 140. 被引量:1
  • 8SHAO Jun, CAO Zhen-fu. A new efficient (t, n) verifiable multi-secret sharing(VMSS) based on YCH scheme [J]. Appl Math Comput, 2005, 168(1): 135-140. 被引量:1
  • 9李锋,李大兴.一种改进的多重密钥共享的门限方案[J].计算机工程,2008,34(5):11-13. 被引量:4
  • 10庞辽军,裴庆祺,焦李成,王育民.基于ID的门限多重秘密共享方案[J].软件学报,2008,19(10):2739-2745. 被引量:15

二级参考文献14

  • 1庞辽军,王育民.基于RSA密码体制(t,n)门限秘密共享方案[J].通信学报,2005,26(6):70-73. 被引量:32
  • 2朱岩,杨永田,孙中伟,冯登国.基于安全多方计算的数字作品所有权证明(英文)[J].软件学报,2006,17(1):157-166. 被引量:3
  • 3王贵林,卿斯汉.对一种多重密钥共享认证方案的分析和改进[J].软件学报,2006,17(7):1627-1632. 被引量:11
  • 4[1]CHANG C C, WU T C, CHEN C P. The design of a conference key distribution system [A]. SEBERY J. Proc Advances in Cryptology-Auscrypt'92 LNCS 718 [C]. Australia: Springer, 1992. 459~466 被引量:1
  • 5[2]KOYAMA K. Secure conference key distribution schemes for conspiracy attack [A]. RUEPPEL R A. Proc Advances in Cryptology-Eurocrypt'92 LNCS 658 [C]. New York: Springer-Verlag, 1993. 449~453 被引量:1
  • 6[3]CHANG C C, LIN C H. How to converse securely in a conference [A]. Proc IEEE 30th Ann Int'l Carnahan Conf [C]. Piscataway, NJ: IEEE Press, 1996. 42~45 被引量:1
  • 7[4]WU T C. Conference key distribution system with user anonymity based on algebraic approach [J]. Comp & Dig Techn, 1997, 144(2): 145~148 被引量:1
  • 8[5]STEER D G, STRAWCZYNSKI L, DIFFIE W, et al. A secure audio teleconference system [A]. GOLDWASSER S. Proc Advances in Cryptology-Crypto'88 LNCS 403 [C]. Santa Barbara, CA: Springer-Verlag,1990. 520~528 被引量:1
  • 9[6]KLEIN B, OTTEN M, BETH T. Conference key distribution protocols in distributed systems [A]. FEIGENBAUM J. Proc Codes and Ciphers-Cryptography and Coding Ⅳ [C]. Essex, English: Formara, 1995. 225~242 被引量:1
  • 10[7]BURMESTER M, DESMEDT Y. A secure and efficient conference key distribution system [A]. SANTIS A D. Proc Advances in Cryptology-Eurocrypt'94 LNCS 950 [C]. Berlin: Springer, 1995. 275~286 被引量:1

共引文献17

同被引文献23

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes [C]//BLAKLEY G R, CHAUN D. Crypto. New York: Springer-Verlag, 1984:47- 53. 被引量:1
  • 2AI-RIYAMI S S, PATERSON K G. Certifieateless public key cryptography [C]//LAIH C S. Lecture Notes in Computer Science: Asiacrypt. Taipei: Springer-Verlag, 2003, 2894: 452-473. 被引量:1
  • 3MAMBO M, USUDA K, OKAMOTO E. Proxy signatures for delegating Signing operation [C]//Proceedings of the 3rd ACM Conference on Computer and Communications Security. New York: ACM, 1996:48-57. 被引量:1
  • 4LEE B, KIM H, KIM K. Strong proxy signature and its applications [C]// Proceeding of ACISP 2001. Oisc, Japan: Springer, 2001: 603-608. 被引量:1
  • 5LI Xiang-xue, CHEN Ke-fei. Certifieateless signature and proxy signature schemes from bilinear pairings [J].Lith Math J, 2005, 45(1): 76-83. 被引量:1
  • 6KANG Bao-yuan, BOYD C, DAWSON E. Identity-based strong designated verifier signature schemes: attacks and new construction [J]. Comput Electr Engin, 2009, 35(1): 49-53. 被引量:1
  • 7SHAMIR A. How to share a secret [J]. Commun ACM, 1979, 22(11): 612-613. 被引量:1
  • 8BRICKELL E F. Some ideal secret sharing schemes [J]. J Combin Math Combin Comput, 1989, 9(6): 105- 133. 被引量:1
  • 9INGEMARSSON I, SIMMONS G J. A protocol to set up shared secret schemes without the assistance of a mutually trusted party [C]//Advances in Cryptology-EUROCRYPT ' 90. Lecture Notes in Computer Science. Berlin: Springer, 1991, 473: 266-282. 被引量:1
  • 10PEDERSEN T P. A threshold cryptosystem without a trusted party [C]//Advances in Cryptology-EUROCRYPT'91. Lecture Notes in Computer Science. Berlin: Springer, 1991, 547: 522-526. 被引量:1

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部