共查询到15条相似文献,搜索用时 125 毫秒
1.
本文把矢量空间秘密共享方案与多重签名方案结合起来,提出了一种新的签名方案,即矢量空间秘密共享-多重签名方案,并对该方案的安全性进行了分析.在该方案中,任何参与者的授权子集能容易地产生群签名,而参与者的非授权子集不可能产生有效的群签名,验证者可通过验证方法验证个体签名和群签名的合法性.该方案能保证一个参与者的授权子集的群签名不能被其他参与者子集所伪造,而且可以跟踪被怀疑的伪造者并将其曝光.该方案能抵御各种可能的攻击. 相似文献
2.
本文把矢量空间秘密共享方案与多重签名方案结合起来,提出了一种新的签名方案,即矢量空间秘密共享-多重签名方案,并对该方案的安全性进行了分析。在该方案中,任何参与者的授权子集能容易地产生群签名,而参与者的非授权子集不可能产生有效的群签名,验证者可通过验证方法验证个体签名和群签名的合法性。该方案能保证一个参与者的授权子集的群签名不能被其他参与者子集所伪造,而且可以跟踪被怀疑的伪造者并将其曝光。该方案能抵御各种可能的攻击。 相似文献
3.
4.
通过对Qian-cao-xue的基于双线性映射的的门限代理签名方案分析,发现该方案并不满足强不可伪造性,任何人包括原始签名人可以伪造一个有效的代理签名,同时该方案也不能抵抗原始签名人改变攻击.在此基础上提出了改进的门限代理签名方案(方案1),改进的方案克服了原方案的安全缺陷.并把矢量空间秘密共享和多重代理签名结合起来,构建了一种更为广泛的基于访问结构的多重代理签名(方案2).门限代理签名方案(方案1)成为方案2的特殊情形.方案2中任何参与者的授权子集能产生多重代理签名,而非参与者不可能产生有效的多重代理签名,接收者可以通过验证方法验证个体代理签名和多重代理签名的合法性,而且能保证任何参与者都能检测出错误的子秘密.能抵御各种可能的攻击. 相似文献
5.
提出了一种非交互式的公开可验证的门限秘密共享方案.该方案借鉴自然进化的思想,由分享的秘密进化出所有参与者的共享,并且采用知识签名的方法保证任何一方都能公开地验证共享的正确性;反过来,基于线性方程组的求解理论,任意k个被验证有效的共享可以恢复秘密.新方案是信息论安全的,易于扩展与更新. 相似文献
6.
7.
基于有限域上的方程根提出一个新的授权子集的签名方案,参与者的签名通过方程根的性质验证,而与现有方案比较,该方案具有秘密计算复杂度低,所需公共信息量小的优点。方案的安全性是基于双线性对的DH问题的困难性。分析表明文中的方案是一个安全、有效的方案。 相似文献
8.
9.
10.
11.
On the classification of ideal secret sharing schemes 总被引:13,自引:0,他引:13
In a secret sharing scheme a dealer has a secret key. There is a finite set P of participants and a set of subsets of P. A secret sharing scheme with as the access structure is a method which the dealer can use to distribute shares to each participant so that a subset of participants can determine the key if and only if that subset is in . The share of a participant is the information sent by the dealer in private to the participant. A secret sharing scheme is ideal if any subset of participants who can use their shares to determine any information about the key can in fact actually determine the key, and if the set of possible shares is the same as the set of possible keys. In this paper we show a relationship between ideal secret sharing schemes and matroids.This work was performed at the Sandia National Laboratories and was supported by the U.S. Department of Energy under Contract No. DE-AC04-76DP00789. 相似文献
12.
Hierarchical Threshold Secret Sharing 总被引:1,自引:0,他引:1
Tamir Tassa 《Journal of Cryptology》2007,20(2):237-264
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such settings, the secret is
shared among a group of participants that is partitioned into levels. The access structure is then determined by a sequence
of threshold requirements: a subset of participants is authorized if it has at least k0 0 members from the highest level, as well as at least k1 > k0 members from the two highest levels and so forth. Such problems may occur in settings where the participants differ in their
authority or level of confidence and the presence of higher level participants is imperative to allow the recovery of the
common secret. Even though secret sharing in hierarchical groups has been studied extensively in the past, none of the existing
solutions addresses the simple setting where, say, a bank transfer should be signed by three employees, at least one of whom
must be a department manager. We present a perfect secret sharing scheme for this problem that, unlike most secret sharing
schemes that are suitable for hierarchical structures, is ideal. As in Shamir's scheme, the secret is represented as the free
coefficient of some polynomial. The novelty of our scheme is the usage of polynomial derivatives in order to generate lesser
shares for participants of lower levels. Consequently, our scheme uses Birkhoff interpolation, i.e., the construction of a
polynomial according to an unstructured set of point and derivative values. A substantial part of our discussion is dedicated
to the question of how to assign identities to the participants from the underlying finite field so that the resulting Birkhoff
interpolation problem will be well posed. In addition, we devise an ideal and efficient secret sharing scheme for the closely
related hierarchical threshold access structures that were studied by Simmons and Brickell. 相似文献
13.
14.
《Journal of Visual Communication and Image Representation》2014,25(5):1093-1101
A hierarchical threshold secret image sharing (HTSIS) scheme is a method to share a secret image among a set of participants with different levels of authority. Recently, Guo et al. (2012) [22] proposed a HTSIS scheme based on steganography and Birkhoff interpolation. However, their scheme does not provide the required secrecy needed for HTSIS schemes so that some non-authorized subsets of participants are able to recover parts of the secret image. In this paper, we employ cellular automata and Birkhoff interpolation to propose a secure HTSIS scheme. In the new scheme, each authorized subset of participants is able to recover both the secret and cover images losslessly whereas non-authorized subsets obtain no information about the secret image. Moreover, participants are able to detect tampering of the recovered secret image. Experimental results show that the proposed scheme outperforms Guo et al.’s approach in terms of visual quality as well. 相似文献
15.
牛冬梅 《信息安全与通信保密》2009,(8):72-73
文献[2]中提出了一种基于异或(XOR)操作的彩色图像秘密共享(2,n)方案,简单易于实现,但恢复密图的效果较差。通过分析此方案,文章提出一个多分存的彩色图像秘密共享(2,n)方案,通过给用户增加分存图像的方法改善了恢复密图的质量。实验分析表明所提方案不仅取得了很好的恢复效果,而且保持了安全性和算法的简单性。 相似文献