期刊文献+

防泄露的秘密共享方案及其在群身份认证协议中的应用 被引量:5

Leakproof secret sharing protocols with applications to group identification scheme
原文传递
导出
摘要 在传统的(t,n)门限秘密共享方案中,t个或更多的诚实参与者能重构秘密K.在重构中,每个秘密分块和秘密K被揭示了,因此K仅仅能被共享一次.文中首先给出防泄露秘密共享方案的定义(该方案由一个分配协议和证明协议构成),然后分别构造了计算上安全的和信息理论上安全的防泄露的秘密共享协议.在我们的协议中,t个或更多的诚实参与者使用了一个知识的多证明者论证系统联合证明他们拥有秘密K,因此秘密K能被多次共享,而且,每个参与者在分配协议中能识别庄家的欺骗,在证明协议中能识别非授权参与者集合的欺骗.我们给出了一个应用实例,即使用我们的防泄露秘密共享方案去构造了一个具有零知识性质的群身份认证协议. In a traditional (t, n)-threshold secret sharing scheme, t or more honest participants can reconstruct the secret K. In the reconstruction process, the individual shares and the secret key K are revealed, hence K is shared once only. In this paper, we firstly give the definition of leakproof secret sharing scheme which is composed of a distribution protocol and a proof protocol, then propose two leakproof secret sharing protocols, a computationally secure protocol and an information-theoretically secure protocol. In our protocols, t or more participants can jointly prove that they hold the secret K by using a multi-prover zero-knowledge argument of knowledge. As a result, the secret K will be shared for as many times as desired. Furthermore, each participant can detect the dealer in the distribution protocol from cheating, and any verifier can prevent non-qualified set of participants in proof protocol from cheating. As an example of the practical impact of our work we use our techniques to construct group identification schemes with zero-knowledge.
出处 《中国科学:信息科学》 CSCD 2012年第5期634-647,共14页 Scientia Sinica(Informationis)
基金 国家自然科学基金(批准号:10871222) 美国国家自然科学基金(批准号:DMS-0302549) 山东大学教育部密码技术与信息安全重点实验室开放课题资助项目
关键词 秘密共享 防泄露秘密共享 多证明者零知识论证 知识证明 群身份认证协议 secret sharing, leakproof secret sharing, multi-prover zero-knowledge argument, proof of knowledgegroup identification scheme
  • 相关文献

参考文献12

  • 1Oded Goldreich,Yair Oren.Definitions and properties of zero-knowledge proof systems[J].Journal of Cryptology.1994(1) 被引量:1
  • 2Uriel Feige,Amos Fiat,Adi Shamir.Zero-knowledge proofs of identity[J].Journal of Cryptology.1988(2) 被引量:1
  • 3Dwork C,Naor M,Sahai A.Concurrent zero-knowledge[].th ACM Symposium on Theory of Computing.1998 被引量:1
  • 4Rosen A.A note on the round-complexity of concurrent zero-knowledge[].Advances in Cryptology-CRYPTO.2000 被引量:1
  • 5Canetti R.Universally composable security:a new paradigm for cryptographic protocols[].th ACM Symposium on Theory of Computing.2002 被引量:1
  • 6Lee Y,Choi B.Zero-knowledge group identification and hidden group signature for smart cards using bilinear pairings[].J Chungcheong Math Soc.2007 被引量:1
  • 7Sazena A,Soh B,Priymak S.Zero-knowledge blind identification for smart cards using bilinear pairings[].Cryptology e-Print ArchiveReport /.2005 被引量:1
  • 8R. Canetti,O. Goldreich,S. Goldwasser,S. Micali.Resettable zero-knowledge[].ACM Symposium on Theory of Computing.2000 被引量:1
  • 9J.Kilian,E.Petrank,C.Rackoff.Lower bounds for zero-knowledge on the Internet[].th FOCS.1998 被引量:1
  • 10M. Ben-Or,S. Goldwasser,J. Kilian,A. Wigderson.Multi-prover Interactive Proofs: How to Remove Intractability Assumptions[].Proc th Ann ACM Symp on Theory of Computing.1988 被引量:1

同被引文献29

  • 1Resch J K, Plank J S. AONT-RS: Blending Security and Performance in Dispersed Storage Systems[C]//Proc. of the 9th USENIX Conference on File and Storage Technologies. Berkeley, USA: USENIX Association, 2011. 被引量:1
  • 2Storer M, Greenan K, Miller E, et al. POTSHARDS——A Secure, Recoverable, Long-term Archival Storage System[J]. ACM Transactions on Storage, 2009, 5(2): 1-35. 被引量:1
  • 3Wang Qian, Ren Kui, Lou Wenjing, et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance[J]. ACM Transactions on Sensor Networks, 2011, 8(1): 954-962. 被引量:1
  • 4Wang Cong, Wang Qian, Ren Kui, et al. Towards Secure and Dependable Storage Services in Cloud Computing[J]. IEEE Transactions on Service Computing, 2012, 5(2): 220-230. 被引量:1
  • 5Juels A, Kaliski B. Pors: Proofs of Retrievability for Large Files[C]//Proc. of the 14th ACM Conference on Computer and Communications Security. Alexandria, USA: ACM Press, 2007: 584-597. 被引量:1
  • 6Erway C, Kupcu A, Papamanthou C, et al. Dynamic Provable Data Possession[C]//Proc. of the 16th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2009: 213-222. 被引量:1
  • 7Wang Cong, Wang Qian, Ren Kui, et al. Privacy-preserving Public Auditing for Data Storage Security in Cloud Computing[C]//Proc. of the 29th Conference on Information Communications. Piscataway, USA: IEEE Press, 2010. 被引量:1
  • 8Ghemawat S, Gobioff H, Leung S, et al. The Google File System[C]//Proc. of the 19th ACM Symposium on Operating Systems Principles. New York, USA: ACM Press, 2003: 29-43. 被引量:1
  • 9Parakh A, Kak S. Space Efficient Secret Sharing for Implicit Data Security[J]. Information Sciences, 2011, 181(2): 335-341. 被引量:1
  • 10沈晓娟.多效性RSA数字签名技术及其应用[J].科技信息,2008(31):52-52. 被引量:1

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部