期刊文献+

适用于任意存取结构的动态多秘密共享方案

Dynamic Multi-secret Sharing Scheme for Arbitrary Access Structure
下载PDF
导出
摘要 为满足一般存取结构的多秘密共享方案在实际应用中的可验证性和动态性需求,提出一种适用于任意存取结构的动态可验证多秘密共享方案,其中每个参与者各自选取秘密份额,采用RSA公钥密码体制将该份额通过公开信道发送给分发者。同时基于双变量单向函数为每个参与者分配伪秘密份额,利用双变量单向函数之间的异或运算设计秘密分发算法及重构算法。分析结果表明,该方案在秘密重构阶段参与者只需要出示其伪份额即可恢复主秘密,无须泄漏真正的秘密份额,具有防欺诈性;秘密份额的分发可以通过公开信道实现,减少了方案的实施代价。 In order to realize verifiability and dynamic property of practical requirements for multi-secret sharing schemes with general access structures, this paper presents a dynamic multi-secret sharing scheme for arbitrary access structure, where each participant selects his own secret share, and sends it to the dealer without secure channel based on RSA cryptosystem. Meanwhile, on the basis of two-variable one-way function, pseudo secret share of each participant is calculated, and secret distributed algorithm and reconstructed algorithm are designed. Analysis result shows that in the reconstruction phase, each participant has only to present his pseudo-secret share to recover the secret without showing his real share, this scheme has the anti-fraud property, and it realizes the distribution of shares through public channel, which can reduce the cost of scheme.
出处 《计算机工程》 CAS CSCD 2013年第12期144-147,共4页 Computer Engineering
基金 国家自然科学基金资助项目(11271237) 陕西师范大学研究生培养创新基金资助项目(2012CXS037)
关键词 多秘密共享 存取结构 双变量单向函数 可验证性 RSA密码体制 multi-secret sharing access structure two-variable one-way function verifiability RSA cryptosystem
  • 相关文献

参考文献12

  • 1Wu Xiaotian,Sun Wei.Random Grid-based Visual Secret Sharing for General Access Structures with Cheat-preventing Ability[J].Journal of Systems and Software,2012,85(5):1119-1134.
  • 2张福泰,王育民.适用于任意接入结构的可验证多秘密分享方案[J].通信学报,2007,28(11):59-64. 被引量:2
  • 3宋云,李志慧.一类完善秘密共享方案的最优信息率[J].计算机工程,2012,38(12):9-12. 被引量:8
  • 4Hu Chunqiang,Liao Xiaofeng,Cheng Xiuzhen.Verifiable Multi-secret Sharing Based on LFSR Sequences[J].Theoretical Computer Science,2012,445:52-62.
  • 5Hsu Ching-Fang,Qi Cheng,Tang Xueming,et al.An Ideal Multi-secret Sharing Scheme Based on MSP[J].Information Sciences,2011,181(7):1403-1409.
  • 6PANG Liaojun,LI Huixian,WANG Yumin.An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures[J].Wuhan University Journal of Natural Sciences,2006,11(6):1649-1652. 被引量:2
  • 7Laih Chi-Sung,Lein Harn,Lee Jau-Yien,et al.Dynamic Threshold Scheme Based on the Definition of Cross-production an N-dimensional Linear Space[C]//Proceedings of Crypto’89.Santa Barbara,USA:Springer-Verlag,1989:20-24.
  • 8Sun H M,Shieh S P.Construction of Dynamic Threshold Schemes[J].Electronics Letters,1994,30(24):2023-2024.
  • 9Hwang Shin-Jia,Chang Chin-Chen.A Dynamic Secret Shar-ing Scheme with Cheater Detection[C]//Proceedings of the 1st Australasian Conference on Information Security and Privacy.London,UK:Springer-Verlag,1996.
  • 10Chor B,Goldwasser S,Micali S.Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults[C]// Proceedings of the 26th IEEE Symposium on Foundations of Computer Science.Portland,USA:[s.n.],1985:251-260.

二级参考文献23

  • 1刘木兰,肖亮亮,张志芳.一类基于图上随机游动的密钥共享体制[J].中国科学(E辑),2007,37(2):199-208. 被引量:3
  • 2SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 3BLAKELY G R. Safeguarding cryptographic keys[A]. Proceedings of the AFIPS 1979 National Computer Conference[C]. New York, USA, 1979. 313:317.
  • 4JACKSON W A, MARTIN K M, O'KEEFE M. Multisecret threshold schemes[A]. Advances in cryptology-CRYPTO'93[C]. Santa Barbara, California, USA, LNCS 773, Springer-Verlag, Berlin, 1993. 126-135.
  • 5HE J, DAWSON E. Multisecret sharing scheme based on one way function[J]. Electronics Letters, 1995, 31(2): 93-95.
  • 6LAIH C, HARN L, LEE J, et al. Dynamic threshold scheme based on the definition of cross-productin an N-dimensional linear space[A]. Proceedings of Crypto'89[C]. Santa Barbara, California, USA, LNCS 435, Springer-Verlag, Berlin,1990. 20-24.
  • 7SUN H M, SHIEH S P. Construction of dynamic threshold schemes[J]. Electronics Letters, 1995, 30(24): 2023-2024.
  • 8HWANG S J, CHANG C C, YANG W P. A dynamic secret sharing scheme with cheater detection[J]. IECE Trans Inf & Syst, 1996, E79-D(7): 936-942.
  • 9CHOR B, GOLDWASSER S, MICALI S, et al. Verifiable secret sharing and achieving simultaneity inthe presenceof faults[A]. Proceedings of 26^th IEEE Symposium on Foundations of Computer Science[C], Oakland, USA, 1985. 251-160.
  • 10STADLER M. Publicly verifiable secret sharing[A]. Proceedings of EUROCRYPT'96[C]. Zaragoza, Spain. LNCS 1070, Springer-Verlag, Berlin, 1996. 190-199.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部