期刊文献+

无可信中心的可动态更新多秘密共享方案 被引量:6

Dynamically Updatable Multi-secret Sharing Scheme Without Trusted Center
下载PDF
导出
摘要 在现有可动态更新的多秘密共享方案中都需要可信中心的参与,且未对同时增加或删除多名成员与多个秘密进行研究。为此,提出一种无可信中心的多秘密共享方案。参与者联合生成多个共享的随机秘密,利用单向散列链构造多项式更新秘密份额,防止攻击者窃取秘密信息。基于零知识证明协议,使任何人可验证参与者分发信息的有效性。采用老成员协助新成员获得秘密份额及改变更新多项式次数的方式,解决多名成员与多个秘密的同时增加或删除问题,并实现成员和秘密的动态管理。分析结果表明,与现有秘密共享方案相比,该方案具有较高的安全性。 General dynamically updatable multi-secret sharing schemes require the participation of a trusted center,and the problems of adding or deleting several members or secrets simultaneously are not solved. A newmulti-secret sharing scheme without trusted center is proposed in this paper. Shared multiple random secrets do not need to be pre-determined.They are jointly generated by all participants. At each updating stage,participants construct the update polynomials by one-way hash chains to update shares periodically. Everyone can verify the validity of the distributed information based on zero-knowledge proof. Newmembers can get shadowsecrets with the help of existing members and the times of updating polynomials can be altered,so the problems of simultaneously adding or deleting several member and serects are solved.The analysis result indicates that the scheme has higer security compared with existing schemes.
作者 谷婷 杜伟章
出处 《计算机工程》 CAS CSCD 北大核心 2016年第3期148-155,共8页 Computer Engineering
关键词 可信中心 可公开验证 可动态更新 零知识证明 秘密共享 trusted center publicly verifiable dynamically updatable zero-knowledge proof secret sharing
  • 相关文献

参考文献15

  • 1Blakley G R. Safeguarding Cryptographic Keys [ C ]// Proceedings of National Computer Conference. New York, US A ~ ACM Press, 1979 : 313-317. 被引量:1
  • 2Shamir A. How to Share a Secret C J 1 ~ Communications of the ACM,1979,22(ll) :612-623. 被引量:1
  • 3Chor B, Goldwasser S, Micali S, et al. Verifiable Secret Sharing and Achieving Simultaneity in the Presence of FaultsIC]//Proceedings of the 26th IEEE Symposium on Foundations of Computer Science. Washington D. C., USA: IEEE Press, 1985:383-395. 被引量:1
  • 4lngemarsson I.Simmons G J. A Protocol to Set up Shared Secret Schemes Without the Assistance of a Mutually Trusted Party [ C]//Proceedings of Cryptology-Eurocrypt'90. Berlin, Germany :Springer-Verlag, 1990:266-282. 被引量:1
  • 5He J,Dawson E. Multistage Secret-sharing Based on One- way Function ( J ~. Electronics Letters, 1994, 30(19) : 1591-1592. 被引量:1
  • 6Herzberg A,Jarecki S, Krawczyk H, et al. Proactive Secret Sharing or: How to Cope with Perpetual LeakageEC]// Proceedings of Cryptology-CRYPTO ' 95.Berlin, Germany : Springer-Verlag, 1995:339-353. 被引量:1
  • 7Stadler M. Publicly Verifiable Secret Sharing ~ C ~//Pro- ceedings of Cryptology-Eurocryptp ' 96. Berlin, Germany : Springer-Verlag, 1996:190-199. 被引量:1
  • 8许春香,魏仕民,肖国镇.定期更新防欺诈的秘密共享方案[J].计算机学报,2002,25(6):657-660. 被引量:27
  • 9符茂胜,罗斌.基于ECC的无可信中心的(t,n)门限秘密共享方案[J].计算机工程与应用,2008,44(32):85-86. 被引量:5
  • 10李大伟,杨庚,朱莉.一种基于身份加密的可验证秘密共享方案[J].电子学报,2010,38(9):2059-2065. 被引量:11

二级参考文献85

共引文献66

同被引文献34

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部