期刊文献+

基于角色的多密门限体制

Role-Based Multisecret Threshold Schemes
下载PDF
导出
摘要 Shamir门限体制可以用来解决多个人共享一个密钥的问题。但是,如果有多个密钥需要让一组成员的部分或者全部成员共享,如果还用Shamir门限体制来解决,就会导致每一个共享方案都需要一个门限体制,也就是说每个成员必须保存一个或多个身份密钥,这显然是不方便也是不安全的。我们利用基于角色的访问控制(RBAC)的思想,提出了一种新的多密门限体制方案,其显著的优点就是在保证安全性的前提下,每一个参与者须且仅需拥有一个身份密钥。因此,该方案不仅具有RBAC的所有优点,而且对于共享者来说也非常方便。 A multisecret threshold scheme is a system that protects more than one secret among a group of participants in such a way that they can only be reconstructed from the joint information held by some predetermined number of these participants. The basic concept of role-based access control (RBAC), which has been around since the advent of multi-use computing is described. Based on the idea of 'role', a multisecret threshold scheme in which every participant needs possessing only one identity key, is presented. Therefore, the scheme not only has all the advantages of RBAC, but also is very convenient for the participants.
出处 《三峡大学学报(自然科学版)》 CAS 2002年第5期417-418,共2页 Journal of China Three Gorges University:Natural Sciences
关键词 多密门限体制 访问控制 秘密共享 multisecret threshold scheme role-based access control secret sharing
  • 相关文献

参考文献9

  • 1Blakley R G. Safeguarding Cryptographic Keys [C].NewYork: AFIPS 1979 Natl. Computer conf, 1979. 被引量:1
  • 2Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979,22(11):612~613. 被引量:1
  • 3Benaloh J , Leichter J. Generalized secret sharing and monotone functions[A]. Advances in cryptolagy-CRYTO-88, Lecture Notes in computer Science[C]. Berlin:Spring-verlag, 1990,27~35. 被引量:1
  • 4stinson D R. An Explication of Secret Sharing Schemes[J]. Designs, Codes and Cryptography, 1992, 2:357~390. 被引量:1
  • 5Chor B,Goldwasser S, Micali S,et al. Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults[A]. In Proceedings of the 26 th IEEE Symposium on the Foundations of Computer Science (FOCS),1995,383~395. 被引量:1
  • 6Blom R. An Optimal Class of symmetric Key Generation Systems[J]. Advances in Cryptology-Europcrypt'84,Lecture Notes in Compute. SCI, 1984, (209): 335~338. 被引量:1
  • 7Blundo C, Santis D A, Herzberg A,et al. Perfectly Secure Key Distribution for Dynamic Conferences[A].Presented at Crypto1992. 被引量:1
  • 8Sandhu R. Role-based access control[M]. Advances in Computers, Academic Press, 1998,46. 被引量:1
  • 9Dawson E, Donovan D. The breadth of shamir's secret sharing scheme[J]. Computer & Security, 1995,13: 69~78. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部