期刊文献+

可防止欺诈的动态秘密分享方案 被引量:31

A dynamic secret sharing scheme to identify cheaters
下载PDF
导出
摘要 基于有限域上离散对数难解问题提出一个计算安全的动态秘密分享方案 ,本方案有效地解决了密钥的翻新与复用问题 ,其效率高且实用 ,特别是能检测伪子密 ,防止欺诈 ,且数据利用率较高。 A dynamic secret sharing scheme with providing computational security to identify cheaters,which is based on the computational difficulty of computing discrete logarithms,is proposed in this paper The renew and reuse problems are properly treated in the scheme The scheme is efficient and practical,in particularly,which can detect the cheaters,and the data in the scheme are sufficiently used
出处 《通信学报》 EI CSCD 北大核心 2000年第5期81-83,共3页 Journal on Communications
基金 国家自然科学基金资助项目 !(6 96 730 2 5)
关键词 动态秘密分享 信息安全 离散对象 secret sharing dynamic threshold scheme authenticator cheating computational security
  • 相关文献

参考文献8

  • 1[1] SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22:612~613.
  • 2[2] BLAKLEY G R.Safeguarding cryptographic keys[A].Proc AFIPS 1979 National Computer Conference[C].1979.313~317.
  • 3[3] SCHNEIER B.Applied Cryptography[M].John Wiley & Sons,Inc,1994.
  • 4[4] STINSON D R.Decomposition constructions for secret sharing schemes[J].IEEE Trans on Inform Theory,1994, 40:118~125.
  • 5[5] LAIH C-S,HARN L,LEE J Y,et al.Dynamic threshold scheme based on the definition of cross-product in an N-dimensional linear space[A].Proc Crypto'89[C].1990.286~297.
  • 6[6] BEIMEL A,CHOR B.Secret sharing with public reconstruction[A].Advances in Cryptology-Crypto'95[C].1995.353~366.
  • 7[7] BLUNDO C,GRESSTI A,SANTIS A D,et al.Fully dynamic secret sharing schemes[A].Proc Crypto'93[C].1994.110~125.
  • 8[8] BLUNDO C,SANTIS A D,CRESCENZO G D,et al.Multi-secret sharing schemes[A].Proc Crypto'94[C].1994.150~163.

同被引文献266

引证文献31

二级引证文献108

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部