首页 | 本学科首页   官方微博 | 高级检索  
     

基于一般访问结构的多重秘密共享方案
引用本文:庞辽军,姜正涛,王育民.基于一般访问结构的多重秘密共享方案[J].计算机研究与发展,2006,43(1):33-38.
作者姓名:庞辽军  姜正涛  王育民
作者单位:西安电子科技大学综合业务网国家重点实验室,西安,710071
摘    要:基于Shamir的门限方案和RSA密码体制,提出一个一般访问结构上的秘密共享方案.参与者的秘密份额是由各参与者自己选择,秘密分发者不需要向各参与者传送任何秘密信息.当秘密更新、访问结构改变或参与者加入/退出系统时,各参与者的份额不需要更新.秘密份额的长度小于或等于秘密的长度.每个参与者只需维护一个秘密份额就可以实现对多个秘密的共享.在秘密恢复过程中,每个参与者能够验证其他参与者是否进行了欺骗.方案的安全性是基于Shamir的门限方案和RSA密码体制的安全性.

关 键 词:信息安全  秘密共享  访问结构
收稿时间:08 2 2004 12:00AM
修稿时间:2004-08-022004-11-04

A Multi-Secret Sharing Scheme Based on the General Access Structure
Pang Liaojun,Jiang Zhengtao,Wang Yumin.A Multi-Secret Sharing Scheme Based on the General Access Structure[J].Journal of Computer Research and Development,2006,43(1):33-38.
Authors:Pang Liaojun  Jiang Zhengtao  Wang Yumin
Abstract:Based on Shamir's threshold scheme and the RSA cryptosystem, a new secret sharing scheme for the general access structure is proposed in this paper. In this scheme, each participant's secret shadow is selected by the participant himself and the dealer need not deliver any secret information to each participant, and thus a secure channel between them is unnecessary. The shadows do not need to be changed when the shared secret is renewed, the access structure is altered, or old participants are deleted?new participants are added. All these shadows are shorter than or as short as the shared secret. Each participant shares many secrets with other participants by holding only one shadow, and in the recovery phase each participant is allowed to check whether another participant provides the true information or not. The security of this scheme is the same as that of Shamir's threshold scheme and the RSA cryptosystem. Analyses show that this scheme is a computationally secure and efficient scheme.
Keywords:RSA
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号