共查询到20条相似文献,搜索用时 843 毫秒
1.
2.
3.
4.
密钥生成是密码系统的一个重要组成部分,其安全性对整个密码系统的安全性起着至关重要的作用.在群体保密通信、电子商务和面向群体的密码学中,往往需要采用分布式的密钥生成方式.本文对基于向量空间接入结构的分布式密钥生成进行了研究.以向量空间接入结构上信息论安全的一个可验证秘密分享方案为基础,提出了适应于这类接入结构的一个安全高效的分布式密钥生成协议.该协议比常见的基于门限接入结构的分布式密钥生成协议具有更广泛的适用性. 相似文献
5.
6.
广义(k,n)-门限方案 总被引:14,自引:1,他引:13
1979年,Shamir提出的(k,n)-门限密钥分散管理的概念使密钥管理更加安全灵活。但这一方案也有其不完善之处,因为在现实中参与密钥管理的人在系统中所处的地位不尽相同,有许多活动必须要求某些特定的人参与才能进行。本文考查了此类情形,将(k,n)-门限方案加以推广,提出了更为一般的(t,k,n)-门限方案,给出(t,k,n)-秘密分享矩阵的概念,并利用(t,k,n)-秘密分享矩阵实现(t,k,n)-门限方案。 相似文献
7.
8.
在理性秘密共享协议中,自利性目标可能会驱使理性参与者偏离协议,从而影响协议的公平性。在(t, n)门限理性秘密共享方案中,其特殊情形(2,2)理性秘密共享方案的公平性较难实现。在同时考虑理性参与者的眼前利益和长远利益的基础上,基于不完全信息动态博弈模型,通过分析理性参与者在(2,2)秘密重构阶段可能采取的策略和信念系统,引入理性参与者的期望收益,研究了(2,2)理性秘密共享重构阶段的完美贝叶斯均衡问题。进一步结合机制设计理论中的VCG(Vickrey-Clarke-Groves)机制,设计激励相容的交互记录机制来约束理性参与者的行为,在不需要秘密分发者保持在线的情形下,提出一个适用于异步通信的公平的(2,2)理性秘密共享方案。 相似文献
9.
10.
11.
Secure communication has become more and more important for system security. Since avoiding the use of encryption one by one can introduce less computation complexity, secret sharing scheme (SSS) has been used to design many security protocols. In SSSs, several authors have studied multipartite access structures, in which the set of participants is divided into several parts and all participants in the same part play an equivalent role. Access structures realized by threshold secret sharing are the simplest multipartite access structures, i.e., unipartite access structures. Since Asmuth–Bloom scheme based on Chinese remainder theorem (CRT) was presented for threshold secret sharing, recently, threshold cryptography based on Asmuth–Bloom secret sharing were firstly proposed by Kaya et al. In this paper, we extend Asmuth–Bloom and Kaya schemes to bipartite access structures and further investigate how SSSs realizing multipartite access structures can be conducted with the CRT. Actually, every access structure is multipartite and, hence, the results in this paper can be seen as a new construction of general SSS based on the CRT. Asmuth–Bloom and Kaya schemes become the special cases of our scheme. 相似文献
12.
13.
14.
视觉密码(VC)是一种用于分享秘密图像的加密方案,与传统的密码技术相比具有简单性、安全性、隐蔽性等优点。其加密是将图像编码为分享,将分享打印在透明胶片上或以数字形式存储;其解密过程是对分享进行叠加,然后通过人类的视觉能力来实现。本文介绍了视觉密码的基本概念和各种不同的视觉密码方案,以及每种方案中使用的技术。此外,对视觉密码在不同领域上的应用做出了说明。 相似文献
15.
16.
Visual secret sharing (VSS) schemes providing secret communication services are classified into two categories depending on the method of encoding the secret: visual cryptography (VC)-based and random grid (RG)-based schemes. A friendly progressive version of the VC-based VSS scheme was presented in 2008; however, it is marred by pixel expansion, which is the innate deficiency of conventional VC-based VSS schemes. This paper proposes a suitable user-friendly RG-based VSS scheme with progressive secret reconstruction and without pixel expansion. The experimental results of the developed scheme validated its feasibility, and a theoretical analysis demonstrated its visual quality and security. 相似文献
17.
Yu-Chi Chen Du-Shiau Tsai Gwoboa Horng 《Journal of Visual Communication and Image Representation》2012,23(8):1225-1233
Visual cryptography (VC), first presented by Naor and Shamir, is a variant of secret sharing, thus it also called visual secret sharing. It can be widely used in many applications such as encrypting large data efficiently. In the literature, the problem of cheating is under consideration in secret sharing. Recently, Horng et al. pointed out that cheating is possible in k-out-of-n VC schemes, and presented two kinds of the cheating prevention schemes for protecting honest participants. One of them is the authentication based cheating prevention scheme. In this paper, we analyze the definition of cheating prevention and propose a new authentication based cheating prevention scheme. This scheme is constructed with Naor–Shamir’s VC scheme. Finally, we give the security analysis to prove that the proposed scheme is immune to cheating. 相似文献
18.
In mobile ad hoc networks (MANETs), identity (ID)-based cryptography with threshold secret sharing is a popular approach for
the security design. Most previous work for key management in this framework concentrates on the protocols and structures.
Consequently, how to optimally conduct node selection in ID-based cryptography with threshold secret sharing is largely ignored.
In this paper, we propose a distributed scheme to dynamically select nodes with master key shares to do the private key generation
service. The proposed scheme can minimize the overall threat posed to the MANET while simultaneously taking into account of
the cost (e.g., energy consumption) of using these nodes. Intrusion detection systems are modeled as noisy sensors to derive
the system security situations. We use stochastic system to formulate the MANET to obtain the optimal policy. Simulation results
are presented to illustrate the effectiveness of the proposed scheme. 相似文献
19.
现有可证明安全的前摄性门限RSA签名方案均依赖加性秘密共享方法,存在每次签名均需所有成员参与,易暴露合法成员的秘密份额,签名效率低下等问题。该文以Shoup门限签名为基础,提出一种基于多项式秘密共享的前摄性门限RSA签名方案,并对其进行了详细的安全性及实用性分析。结果表明,在静态移动攻击者模型中,该方案是不可伪造的和稳健的,与现有同类方案相比,其通信开销更低,运算效率更高。 相似文献
20.
Traditional secret sharing schemes involve the use of a mutually trusted authority to assist in the generation and distribution
of shares that will allow a secret to be protected among a set of participants. In contrast, this paper addresses the problem
of establishing secret sharing schemes for a given access structure without the use of a mutually trusted authority. A general protocol is discussed and several implementations of this protocol are
presented. Several efficiency measures are proposed and we consider how to refine the general protocol in order to improve
the efficiency with respect to each of the proposed measures. Special attention is given to mutually trusted authority-free
threshold schemes. Constructions are presented for such threshold schemes that are shown to be optimal with respect to each
of the proposed efficiency measures.
Received 13 September 1995 and revised 10 April 1996 相似文献