期刊文献+

对一种基于广义接入结构的多重秘密分享方案的分析和改进

Analysis and improvement of multi-secret sharing schemebased on general access structure
下载PDF
导出
摘要 Peng(2006)给出了一种高效率的基于广义接入结构的多重秘密分享方案。在该方案中,不仅成员持有的子秘密能够重复使用,而且管理者分发的子秘密和成员提供的影子子秘密也都是可以认证的。给出了两个攻击,不诚实的管理者可以将假的子秘密分发给成员;而不良的成员可以很容易地伪造假的但能满足认证等式的影子子秘密,从而欺骗诚实成员。最后给出了改进方法,避免了上述攻击。 Peng proposed an efficient multi-secret sharing scheme based on general access structure in 2006. In his scheme, not only the shares held by the participants are reusable, but also the shares distributed by the dealer and the shadow shares provided by participants are verifiable. The security of Peng's scheme was analyzed and two attacking methods were proposed. It demonstrates that both of the share-authenticatlng and shadow-secret-authenticatlng methods are insecure, Using our attacks, a dishonest dealer can distribute fake shares to participants, and malicious participants can easily forge fake shadow shares, so the honest participants will be cheated. At last, improvement was made to avoid those attacks.
作者 余昭平 康斌
出处 《计算机应用》 CSCD 北大核心 2007年第3期593-594,604,共3页 journal of Computer Applications
基金 现代通信国家重点实验室基金项目(51436020405JB5205)
关键词 秘密分享 多重秘密分享 接入结构 信息安全 secret sharing multi-secret sharing access structure information security
  • 相关文献

参考文献9

  • 1SHAMIR A.How to share a secret[J].Communication of the ACM,1979,22(11):612-613.
  • 2BLAKLEY GR.Safeguarding cryptographic keys[A].Proceedings of the National Computer Conference[C].Montvale,NJ:AFIPS Press,1979.313 -317.
  • 3TOMPA M,WOLL H.How to share a secret with cheaters[J].Journal of Cryptology,1988,1(1):133-138.
  • 4施荣华.一种多重密钥共享认证方案[J].计算机学报,2003,26(5):552-556. 被引量:21
  • 5庞辽军,柳毅,王育民.一个有效的(t,n)门限多重秘密共享体制[J].电子学报,2006,34(4):587-589. 被引量:26
  • 6彭银桥,甘元驹,周继承.基于广义接入结构的防欺诈多秘密分享方案[J].计算机工程,2006,32(13):159-160. 被引量:2
  • 7CHAUM D,PEDERSEN TP.Transferred cash grows in size[A].RUEPPEL RA,ed.Advances in Cryptology Eurocrypt'92 Proceedings,LNCS 658[C].Berlin:SpringerVerlag,1993.390-407.
  • 8POINTCHEVAL D,STERN J.Security arguments for digital signatures and blind signatures[J].Journal of Cryptology,2000,13(3):361-396.
  • 9BELLARE M,ROGAWAY P.Random oracles are practical:a paradigm for designing effident protocols[A].First ACM Conference on Computer and Communication Security[C].New York:ACM Press,1993.62 -73.

二级参考文献13

共引文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部