期刊文献+

一种改进的多秘密共享方案

Improved Multi-secret Sharing Scheme
下载PDF
导出
摘要 研究基于椭圆曲线的多秘密共享方案,发现其在多秘密共享时无法保证安全性,而且不能抵抗窃听和欺骗攻击。为此,给出一种改进的多秘密共享方案,该方案对于不同的秘密,采用随机的加密参数,以保证多个秘密同时共享时的安全性,通过加密发送的信息对抗窃听攻击,对参与者进行身份认证,从而有效抵御抗欺骗攻击。分析结果表明,与原方案相比,该方案具有更高的安全性。 This paper studies a multi-secret sharing scheme based on elliptic curve,and finds that it is not safe when multiple secrets are shared and the scheme can not resist the interception and cheat.So an advanced scheme is proposed,in the advanced scheme,the encryption parameters for each secret are different,the distribute information is encrypted,and the participants are authenticated,it can resist the interception and cheat effectively.Analysis results show that the scheme has good security compared with old scheme.
作者 顾洋 刘嘉勇
出处 《计算机工程》 CAS CSCD 北大核心 2011年第21期111-113,共3页 Computer Engineering
关键词 密码学 椭圆曲线 秘密共享 自双线性配对 cryptography elliptic curve secret sharing self-bilinear paring
  • 相关文献

参考文献8

  • 1Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 24(11): 612-613. 被引量:1
  • 2Blakley G. Safeguarding Cryptographic Key[C]//Proceedings of AFIPS'79. New York, USA: Is. n.], 1979: 313-317. 被引量:1
  • 3Crescenzo G D. Sharing One Secret vs. Sharing Many Secrets[J]. Theoretical Computer Science, 2003, 295(1-3): 123-140. 被引量:1
  • 4Dehkordi M H, Mashhadi S. New Efficient and Practical Verifiable Multi-secret Sharing Schemes[J]. Information Sciences, 2008, 178(5): 2262-2274. 被引量:1
  • 5Zhao Jianjie, Zhang Jianzhong, Zhao Rong. A Practical Verifiable Multi-secret Sharing Scheme[J]. Computer Standards & Interfaces, 2007, 29(1): 138-141. 被引量:1
  • 6Liu Duo, Huang Dongping, Luo Ping. New Schemes for Sharing Points on an Elliptic Curve[J]. Computers and Mathematics with Applications, 2008, 56(6): 1556-1561. 被引量:1
  • 7Lee H S. A Self-pairing Map and Its Applications to Cryptogr- aphy[J]. Applied Mathematics and Computation, 2004, 151(1): 671-678. 被引量:1
  • 8陈勤,陈达,张旻,徐坤.基于双线性对的多重秘密共享方案[J].计算机工程,2010,36(12):159-161. 被引量:3

二级参考文献6

  • 1Shamir A.How to Share a Secret[J].Communications of the ACM,1979,24(11):612-613. 被引量:1
  • 2Harn L.Efficient Sharing(Broadcasting)of Multiple Secrets[J].IEEE Proceedings on Computers and Digital Techniques,1995,142(3):237-240. 被引量:1
  • 3Hwang R J,Chang C C.An On-line Secret Sharing Scheme for Multi-secrets[J].Computer Communications,1998,21(13):1170-1176. 被引量:1
  • 4Chien H Y,Jan J K,Tseng Y M.A Practical(t,n)Multi-secret Sharing Scheme[J].IEICE Trans.on Fundamentals,2000,83(12):2762-2765. 被引量:1
  • 5Yang C C,Chang T Y,Hwang M S.A(t,n)Multi-secret Sharing Scheme[J].Applied Mathematics and Computation,2004,151(2):483-490. 被引量:1
  • 6李慧贤,庞辽军.基于双线性变换的可证明安全的秘密共享方案[J].通信学报,2008,29(10):45-50. 被引量:20

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部