首页 | 本学科首页   官方微博 | 高级检索  
     

(t,n)阈方案的欺诈识别
引用本文:谭凯军,诸鸿文,顾尚杰. (t,n)阈方案的欺诈识别[J]. 计算机研究与发展, 1999, 36(7): 853-858
作者姓名:谭凯军  诸鸿文  顾尚杰
作者单位:上海交通大学电子工程系
摘    要:(t,n)阈方案中的欺诈识别是一个很重要的问题。文中提出了一种有效的基于平方剩作的欺诈识别方案,攻击时的难度相当于分解两个在大素数的乘积的难度,它无须使用单向哈希函数,并且对公共参数的完整性给予保证,可以阻止阴谋者起在某个特殊的成员,它很容易扩展到分享多个秘密的情况,它所需的通信量数Chang-Hwang方案小。

关 键 词:欺诈识别 阈方案 平方剩余 信息安全

CHEATER IDENTIFICATION IN(t,n) THRESHOLD SCHEME
TAN Kai-Jun(. CHEATER IDENTIFICATION IN(t,n) THRESHOLD SCHEME[J]. Journal of Computer Research and Development, 1999, 36(7): 853-858
Authors:TAN Kai-Jun(
Affiliation:TAN Kai-Jun;(Department of Electronic Engineering
Abstract:Cheating detection is a very important issue for ( t,n ) threshold schemes. An efficient cheater detection scheme based on quadratic residues is proposed in this paper. The attack is as difficult as factoring the product of two large prime numbers. The scheme doesn't need any one way hash function. The integrity guarantee is given to the public parameters, which can prevent a conspirator from falsely accusing any specific members. It can be easily expanded to the multi secret sharing scheme. The quantity of communication is smaller than that in Chang Hwang scheme.
Keywords:cheater identification   threshold scheme   quadratic residues   secret shares  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号