摘要
Peng(2006)给出了一种高效率的基于广义接入结构的多重秘密分享方案。在该方案中,不仅成员持有的子秘密能够重复使用,而且管理者分发的子秘密和成员提供的影子子秘密也都是可以认证的。给出了两个攻击,不诚实的管理者可以将假的子秘密分发给成员;而不良的成员可以很容易地伪造假的但能满足认证等式的影子子秘密,从而欺骗诚实成员。最后给出了改进方法,避免了上述攻击。
Peng proposed an efficient multi-secret sharing scheme based on general access structure in 2006. In his scheme, not only the shares held by the participants are reusable, but also the shares distributed by the dealer and the shadow shares provided by participants are verifiable. The security of Peng's scheme was analyzed and two attacking methods were proposed. It demonstrates that both of the share-authenticatlng and shadow-secret-authenticatlng methods are insecure, Using our attacks, a dishonest dealer can distribute fake shares to participants, and malicious participants can easily forge fake shadow shares, so the honest participants will be cheated. At last, improvement was made to avoid those attacks.
出处
《计算机应用》
CSCD
北大核心
2007年第3期593-594,604,共3页
journal of Computer Applications
基金
现代通信国家重点实验室基金项目(51436020405JB5205)
关键词
秘密分享
多重秘密分享
接入结构
信息安全
secret sharing
multi-secret sharing
access structure
information security