期刊文献+

可验证的动态多秘密共享方案 被引量:2

Dynamic multi-secret sharing scheme with verification
在线阅读 下载PDF
导出
摘要 基于RSA密码体制、单向Hash函数和XOR运算,文章提出一个可验证的动态多秘密共享方案。该方案具有高效性和灵活性,每位参与者仅需保存1个主秘密份额就可根据不同大小的门限值重构不同的主秘密;可以动态添加或更新秘密,也可以动态添加或删除参与者,使方案易于控制。该方案适用于不具备安全信道的环境,具有可验证的性质,可以防止参与者与分发者的欺骗行为。 Base on the RSA cryptosystem, one-way Hash functions and exclusive OR(XOR) operation, this paper proposes a dynamic multi-secret sharing scheme with verification. The scheme is more efficient and flexible, each participant keeps only one master secret share which can reconstruct different group secrets according to the size of threshold values. The scheme can add new secrets or update the secrets, and the scheme also can remove or add participants freely so that the scheme is manageable. The scheme is valuable in the environments where the security channels are unavailable, and it has verifiable property, which can avoid the fraud of the dealer and the participants.
作者 王娅如 李富林 朱士信 WANG Yaru;LI Fulin;ZHU Shixin(School of Mathematics,Hefei University of Technology,Hefei 230601,China)
出处 《合肥工业大学学报(自然科学版)》 CAS 北大核心 2019年第12期1725-1728,共4页 Journal of Hefei University of Technology:Natural Science
基金 国家自然科学基金资助项目(61772168 60973125 61572168) 安徽省自然科学基金资助项目(1508085MA13)
关键词 密码学 秘密共享 可验证的 动态 LAGRANGE插值多项式 cryptography secret sharing verifiable dynamic Lagrange interpolation polynomial
  • 相关文献

参考文献1

二级参考文献15

  • 1Blakley G R. Safeguarding Cryptographic Keys [ C ]// Proceedings of National Computer Conference. New York, US A ~ ACM Press, 1979 : 313-317.
  • 2Shamir A. How to Share a Secret C J 1 ~ Communications of the ACM,1979,22(ll) :612-623.
  • 3Chor B, Goldwasser S, Micali S, et al. Verifiable Secret Sharing and Achieving Simultaneity in the Presence of FaultsIC]//Proceedings of the 26th IEEE Symposium on Foundations of Computer Science. Washington D. C., USA: IEEE Press, 1985:383-395.
  • 4lngemarsson I.Simmons G J. A Protocol to Set up Shared Secret Schemes Without the Assistance of a Mutually Trusted Party [ C]//Proceedings of Cryptology-Eurocrypt'90. Berlin, Germany :Springer-Verlag, 1990:266-282.
  • 5He J,Dawson E. Multistage Secret-sharing Based on One- way Function ( J ~. Electronics Letters, 1994, 30(19) : 1591-1592.
  • 6Herzberg A,Jarecki S, Krawczyk H, et al. Proactive Secret Sharing or: How to Cope with Perpetual LeakageEC]// Proceedings of Cryptology-CRYPTO ' 95.Berlin, Germany : Springer-Verlag, 1995:339-353.
  • 7Stadler M. Publicly Verifiable Secret Sharing ~ C ~//Pro- ceedings of Cryptology-Eurocryptp ' 96. Berlin, Germany : Springer-Verlag, 1996:190-199.
  • 8符茂胜,罗斌.基于ECC的无可信中心的(t,n)门限秘密共享方案[J].计算机工程与应用,2008,44(32):85-86. 被引量:5
  • 9李大伟,杨庚,朱莉.一种基于身份加密的可验证秘密共享方案[J].电子学报,2010,38(9):2059-2065. 被引量:11
  • 10曾亮,杜伟章.自选子密钥的可验证广义秘密共享方案[J].计算机工程,2011,37(16):138-139. 被引量:2

共引文献5

同被引文献10

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部