期刊文献+

基于身份自证实的秘密共享方案 被引量:7

An Identity (ID)-Based and Self-Certified Secret Sharing Scheme
下载PDF
导出
摘要 为了解决现有秘密共享方案中秘密份额的安全分发问题,基于Girault密钥交换协议,结合基于身份(ID)的公钥密码技术提出了一个新的秘密共享方案,并对其进行了安全性和性能分析.该方案中,用户的私钥作为其秘密份额,无须秘密分发者为每个用户分发秘密份额.用户的私钥可以由用户自己选取,可信第三方无法获取其私钥.同时,任何人都可以以离线方式验证每一个参与者公钥的合法性.分析表明,文中所提出的基于身份的秘密共享方案具有更高的安全性和有效性,能更好地满足应用需求. In order to resolve the secure distribution problem in the existing secret sharing schemes,based on Girault s key exchange protocol,a new secret sharing scheme is proposed,which adopts the ID-based public key cryptography technology.And then,security and performance analysis is made on this scheme.Each participant s private key is used as his secret shadow,which are not selected and redistributed by the secret dealer any longer.The private key of each participant is chosen by the participant himself,and even the trusted third party cannot gain his private key. At the same time, anyone can verify every participant's public key, and judge whether it is valid in the form of off line. Analysis shows that the proposed ID-based secret sharing scheme is more secure and effective than others, and it can be more applicable.
出处 《计算机学报》 EI CSCD 北大核心 2010年第1期152-156,共5页 Chinese Journal of Computers
基金 国家自然科学基金(60803150 60803151) 国家"八六三"高技术研究发展计划项目基金(2008AA01Z411) 国家自然科学基金委员会-广东联合基金重点项目(U0835004) 中国博士后科学基金(20090451495) 陕西省自然科学基础研究计划项目(2007F37)资助~~
关键词 密钥交换 基于身份的公钥密码技术 秘密共享 key exchange ID-based public key cryptography technology secret sharing
  • 相关文献

参考文献10

  • 1Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11):612- 613.
  • 2Blakley G. Safeguarding cryptographic keys//Proceedings of the AFIPS 1979 National Computer Conference. New York, 1979:313-317.
  • 3费如纯,王丽娜.基于RSA和单向函数防欺诈的秘密共享体制[J].软件学报,2003,14(1):146-150. 被引量:41
  • 4Li H X, Pang L J, Cai W D. An efficient threshold multigroup-secret sharing scheme//Proceedings of the Advanees in Soft Computing (ICFIE' 07). Springer-Verlag. ASC 40, 2007:911-918.
  • 5Pang L J, Wang Y M. A new (t, n) multi-secret sharing scheme based on Shamir' s secret sharing. Applied Mathematics and Computation, 2005, 167(2) : 840- 848.
  • 6Hwang R -J, Chang C-C. An on -line secret sharing scheme for multi-secrets. Computer Communications, 1998, 21 (13): 1170-1176.
  • 7Hwang R J, Lai C H, Su F F. An efficient signcryption scheme with forward secrecy based on elliptic curve. Applied Mathematics and Computation, 2005, 167(1): 870-881.
  • 8Pang L J, Wang Y M. A new (t, n) multi secret sharing scheme based on shamir's secret sharing. Applied Mathematics and Computation, 2005, 167(2): 840-848.
  • 9Girauh. An identity-based identification scheme based on discrete logarithms modulo a composite number//Proceedings of the EUROCRYPT'90, 1991:481-486.
  • 10Girault. Self -certified public keys//Proceedings of the EUROCRYPT'91, 1991:490- 497.

二级参考文献2

共引文献40

同被引文献49

  • 1庞辽军,王育民.基于RSA密码体制(t,n)门限秘密共享方案[J].通信学报,2005,26(6):70-73. 被引量:32
  • 2李滨.基于特殊访问权限的差分秘密共享方案[J].四川大学学报(自然科学版),2006,43(1):78-83. 被引量:20
  • 3张艳硕,刘卓军.基于差分的特殊权限下(m+n,t_1+t_2)门限秘密共享[J].计算机工程与应用,2007,43(12):20-22. 被引量:2
  • 4张艳硕,刘卓军.基于特殊权限的另一门限秘密共享方案[J].计算机工程与应用,2007,43(20):143-144. 被引量:1
  • 5Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22( 1 ) : 612-613.
  • 6Blakeley G R. Safeguarding cryptographic keys[ C]//Proceedings of the National Computer Conference. New York:AFIPS Press, 1979: 313-317.
  • 7Chor B, Goldwasser S, Micali S. Verifiable secret sharing and achieving simultaneity in the presence of faults[ C ]////Proceedings of the 26th Annual Symposium on Foundations of Computer Science. Washington, DC : IEEE Computer Society, 1985 : 383-395.
  • 8Feldman P. A practical scheme for non-interactive verifiable secret sharing [ C ]////Proceedings of the 282 IEEE Syrup on Foundations ofComp, Science(FOCS' 87). Los Angeles: IEEE Computer Society, 1987: 427-437.
  • 9Pedersen T P. Distributed provers with applications to undeniable signatures [ C ] //Proceedings of Eurocrypt' 91, Lecture Notes in Computer Science, LNCS 547. Berlin:Springer-Verlag, 1991: 221-238.
  • 10Lin H Y, Ham L. Fair reconstruction of a secret[ J]. Information Processing Letters, 1995, 55 (1) : 45-47.

引证文献7

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部