期刊文献+

基于椭圆曲线密码体制的先应式秘密共享方案 被引量:1

A Proactive Secret Sharing Scheme Based on the Elliptic Curve Cryptosystem
下载PDF
导出
摘要 直接使用传统密码学甚至门限密码学提供的方法都不能很好地保证密钥的安全性。而先应式秘密共享方案则能较好地解决这类问题。它是在(t,n)门限密码学密钥共享的基础上,通过周期性地刷新共享份额的值(但不改变共享的密钥)并清除原来的共享份额值,使得攻击者在一个周期中获得的信息在刷新之后变得毫无用处。所以,攻击者要想窃取一个系统的密钥,必须在同一个周期内攻破t个或者t个以上的服务器才可能成功。因此,合理设置门限参数t和时间周期的长短就可以保证密钥的长期安全性。文中设计了一种基于椭圆曲线密码体制的先应式秘密共享方案,包括初始化、份额更新、份额恢复和秘密重构,实现了先应式秘密共享协议的各种算法。 It's insufficient just to apply the classic cryptography as well as threshold cryptosysterns. Only proactive secret sharing can properly protect it. Proactive secret sharing is a non - trivial extension of ( t, n ) threshold cryptosystems, where shares are periodically renewed (without changing the secret ) in such a way that information gained by the adversary in one time period is useless for attacking the secret after the shares are renewed. Hence, the adversary willing to learn the secret needs to break to all t share holders or more than t share holders during the same time period. If the time period and the threshold t are selected properly, proactive secret sharing can maintain the overall security of the information. The article presents a proactive secret sharing scheme based on the Elliptic Curve Cryptcsystem(ECC), including initialization of share,renewal of share,recovery of share and reconstruction of secret. The paper implements all algorithms of proactive secret sharing protocol.
出处 《计算机技术与发展》 2007年第7期131-134,共4页 Computer Technology and Development
基金 十五预研基金项目(41801150201) 航空基金项目(04c52009)
关键词 先应式秘密共享 可验证秘密共享 份额更新 proactive secret sharing verifiable secret sharing (VSS) shares refresh
  • 相关文献

参考文献8

  • 1周全,杨华冰,黄继海,赵书文.先验式秘密共享方案及实现[J].情报指挥控制系统与仿真技术,2005,27(3):57-60. 被引量:1
  • 2Shamir A.How to Share a Secret[J].Communications of the ACM,1979,22(11):612 -613.
  • 3Pedersen T P.Distributed provers with applications to undeniable signatures[C]//In:Proc.Eurocrypt'91.Lecture Notes in Computer Science 547.New York:Springer-Verlag,1991:221-238.
  • 4Hankerson D,Menezes A,Vanstone S.椭圆曲线密码学导论[M].张焕国,等译.北京:电子工业出版社,2005.
  • 5Nikov V,Nikova S.On Proactive Secret Sharing Schemes[J].Lecture Notes in Computer Science,2004,3357:308-311.
  • 6Asaeda H,Rahman M,Toyama Y.Structuring Proactive Secret Sharing in Mobile Ad-hoc Networks[C] // International Symposium on Wireless Pervasive Computing (ISWPC),IEEE.Phuket,Thailand:[s.n.],2006:1-6.
  • 7郭渊博,马建峰.异步及不可靠链路环境下的先应式秘密共享[J].电子学报,2004,32(3):399-403. 被引量:7
  • 8Jiejun K,Petros Z,Luo Haiyun,et al.Providing robust and ubiquitous security support for mobile ad-hoc networks[C] //IEEE Ninth International Conference on Network Protocols.Riverside,USA:[s.n.],2001:251-260.

二级参考文献14

  • 1[1]A Herzberg,S Jarecki,H Krawczyk,M Yung.Proactive secret sharing or:How to cope with perpetual leakage[A].Advances in Cryptology-Crypto′95,the 15th Annual International Cryptology Conference[C].Heidelberg:Springer-Verlag,1995.457-469.
  • 2[2]R Canetti,R Gennaro,A Herzberg,D Naor.Proactive security:Long-term protection against break-ins[J].CryptoBytes,1997,3(1):1-8.
  • 3[3]S Jarecki.Proactive secret sharing and public key cryptosystems[D].Cambridge:Department of Electrical Engineering and Computer Science,Massachusetts Institute of Technology,1995.
  • 4[4]Y Frankel,P Gemmell,P Mackenzie,M Yung.Optimal resilience proactive public-key cryptosystems[A].Proceedings of the 38th Annual Symp.On Foundations of Computer Science[C].New York:IEEE Press,1997.384-393.
  • 5[5]T Draelos,V Hamilton,G Istrail.Proactive DSA application and implementation[R].Albuquerque:Sandia National Laboratories,1998.
  • 6[6]A Herzberg,M Jakobsson,S Jarecki,H Krawczyk,M Yung.Proactive public-key and signature schemes[A].Proceedings of the 4th Annual Conference on Computer Communications Security[C].New York:ACM Press,1997.100-110.
  • 7[7]M Aguilera,S Toueg,B Deianov.Revisiting the weakest failure detector for uniform reliable broadcast[A].Proceedings of the 13th International Symposium on Distributed Computing[C].Heidelberg:Springer-Verlag,1999.19-33.
  • 8[8]R Gennaro,S Jarecki,H Krawczyk,T Rabin.Robust threshold DSS signatures[A].Advances in Cryptology-Eurocrypt'96,International Conference on the Theory and Application of Cryptographic Techniques[C].Heidelberg:Springer-Verlag,1996.354-37.
  • 9[9]C Cachin,K Kursawe,Anna Lysyanskaya,Reto Strobl.Asynchronous verifiable secret sharing and proactive cryptosystems[A].ACM Conference on Computer and Communications Security[C].New York:ACM Press,2002.88-97.
  • 10[10]L Zhou,F.B Schneider,R Renesse.Proactive secret sharing for asynchronous systems[EB/OL].Submitted to ACM Transactions on Infor-mation and System Security.http://research.microsoft.com/users/lidongz/apssTISS.ps.

共引文献6

同被引文献8

  • 1石润华,黄刘生.一种新的门限秘密共享方案[J].合肥工业大学学报(自然科学版),2006,29(2):164-168. 被引量:4
  • 2CHOR B, GOLDWASSER S, M1CAL S, et al. Verifiable secret sharing and achieving simultaneity in the presence of faults [ C]//Proc of IEEE FOCS'85. New York: IEEE Press, 1985 : 383-395.
  • 3PEDERSEN T P. Non-interactive and information-theoretic secure verifiable secret sharing [C]//Proceeding of the llth Annual International Cryptology Conference. London: Springer-Verlag, 1991, 576: 129-139.
  • 4GENNARO R, RABIN M, RABIN T. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography[ C] //Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing. New York: ACM Press, 1998: 101-111.
  • 5NIKOV V, NIKOVA S. On proactive secret sharing schemes [ M ] //Lecture Notes in Computer Science. Berlin: Springer Verlag, 2004, 3357: 308-325.
  • 6ASAEDA H, RAHMAN M, TOYAMA Y. Structuring proactive secret sharing in mobile ad-hoc networks [ C ]//International Symposium on Wireless Pervasive Computer (ISWPC). Phuket, Thailand: IEEE, 2006: 1-6.
  • 7HERZBERG A, JARECKI S, KRAWCZYK H. Proactive secret sharing or: how to cope with perpetual leakage [C]// Coppersmith Advances in Cryptology CRYPTO'95. Berlin: Springer Verlag, 1995: 339-352.
  • 8石润华,仲红,黄刘生.公开可验证的门限秘密共享方案[J].微电子学与计算机,2008,25(1):29-33. 被引量:5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部