期刊文献+

允许新成员加入的无可信中心秘密共享方案分析 被引量:4

New Member Joining in a Secret Sharing Scheme without a Trusted Party
下载PDF
导出
摘要 现有的无可信中心秘密共享方案中,当有新成员加入时,由于没有传统的可信中心来分发秘密份额,新成员很难获得秘密份额。针对这个问题,基于离散对数求解的困难性,提出一个新的无可信中心秘密共享方案。该方案允许新成员加入,已有成员可以协助新成员获取秘密份额,而不必泄露自己的秘密份额。因此,该方案具有很高的公正性、安全性和鲁棒性。 In the present secret sharing scheme without a trusted party,if there isn't a trusted party which can distribute share to every member,the new member can hardly gain his or her share.To solve this problem,a new secret sharing scheme based on the intractability of the discrete logarithm is presented.This scheme could permit a new member to join in,and the original members' share will not be leaked out when they help the new member to gain the share.The proposed scheme which is secure,fair and robust,has good practical application.
出处 《重庆科技学院学报(自然科学版)》 CAS 2011年第6期173-175,182,共4页 Journal of Chongqing University of Science and Technology:Natural Sciences Edition
基金 安徽高校省级自然科学研究项目(KJ2010B162) 合肥师范学院院级科研项目(2011kj03)
关键词 可信中心 秘密共享 门限方案 离散对数 LAGRANGE插值 trusted party secret sharing threshold scheme discrete logarithm Lagrange interpolation
  • 相关文献

参考文献4

  • 1Shamir A. How to Share a Secret, Commun[J].ACM1979,22: 612-613. 被引量:1
  • 2Blakley G R.Safeguarding Cryptographic Keys[C]//Proceedings' AFIPS 1979 National Computer Conference2qew York: 1979 (48):313-317. 被引量:1
  • 3LI Xiao,HE Mingxing.A Protocol of Member-join in a Secret Sharing Scheme [C]//In Proc of the 2th Information Security Practice andExperience.Berlin:Springer-Verlag2006:134-141. 被引量:1
  • 4Ham L.Efficient Sharing (broadcasting) of Multi-pie Secrets [J].IEE Proc.Comput.Digit Tech 1995,142(3) :237-240. 被引量:1

同被引文献43

  • 1王利朋,胡明生,贾志娟,公备,张家蕾.基于中国剩余定理的区块链投票场景签名方案[J].计算机应用研究,2020,37(2):538-543. 被引量:4
  • 2董攀,况晓辉,卢锡城.一种秘密共享新个体加入协议(英文)[J].软件学报,2005,16(1):116-120. 被引量:16
  • 3田子建,王继林,伍云霞.一个动态的可追踪匿名认证方案[J].电子与信息学报,2005,27(11):1737-1740. 被引量:10
  • 4Sattar J Aboud, Mohammad AL-Fayoumi. Efficient thresh- old signature scheme [ J ]. International Journal of Ad- vanced Computer Sciences and Applications, 2012,3 ( 1 ) : 112-116. 被引量:1
  • 5Ateniese G,Herzberg A,Krawczyk H,et al.Untraceable mobility or how to travel incognito[J].Computer Networks,1999,31(8):871-884. 被引量:1
  • 6Kong J J,Hong X Y,Gerla M.An identity-free and ondemand routing scheme against anonymity threats in mobile Ad Hoc networks[J].IEEE Transactions on Mobile Computing,Frequency,2007,6:888-902. 被引量:1
  • 7Lee C H,Deng X T,Zhu H F.Design and sccurity analysis of anonymous group identification protocols[C]//Proceedings of Pulic Key Cryptography,February 2002,Paris,France.Berlin Heidelberg:Springer-Verlag,2002:188-198. 被引量:1
  • 8Eliane J,Guillaume P.On the security of homage group authentication protocol[C]//Proceedings of Cayman Islands,British West Indies,Feb 19-22,2001,2339:106-116. 被引量:1
  • 9Xu Z M,Tian H,Liu D S,et al.A ring-signature anonymous authentication method based on one-way accumulator[C]//Proceedings of Communication Systems,Networks and Applications Conference,2010:56-59. 被引量:1
  • 10Hirose S,Yoshida S.A user authentication scheme with identity and location privacy[C]//Proceedings of the 6th Australasian Conference on Information Security and Privacy,Sydney,Australia,July 11-13,2001,2119:235-246. 被引量:1

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部