首页 | 本学科首页   官方微博 | 高级检索  
     

动态门限多重秘密共享方案
引用本文:庞辽军,李慧贤,王育民.动态门限多重秘密共享方案[J].计算机工程,2008,34(15):164-165.
作者姓名:庞辽军  李慧贤  王育民
作者单位:1. 西安电子科技大学计算机网络与信息安全教育部重点实验室,西安,710071
2. 西北工业大学计算机学院,西安,710072
基金项目:中国博士后科学基金资助项目 , 陕西省自然科学基金资助项目
摘    要:提出一个动态的门限秘密共享方案。参与者的秘密份额由各参与者自己选择,秘密分发者无须向各参与者传送任何秘密信息,因此,他们之间不需要安全信道。当秘密更新、参与者加入或退出系统时,各参与者的份额无须更新。秘密份额的长度小于或等于秘密的长度。每个参与者只须维护一个秘密份额,就可以实现对多个秘密的共享。在秘密恢复过程中,每个参与者能够验证其他参与者是否进行了欺骗。该方案以Shamir的门限方案和RSA密码体制的安全性为基础,是一个安全、高效的方案。

关 键 词:秘密共享  门限方案  安全性

Dynamic Threshold Multi-secret Sharing Scheme
PANG Liao-jun,LI Hui-xian,WANG Yu-min.Dynamic Threshold Multi-secret Sharing Scheme[J].Computer Engineering,2008,34(15):164-165.
Authors:PANG Liao-jun  LI Hui-xian  WANG Yu-min
Affiliation:(1. Ministry of Education Key Lab of Computer Network and Information Security, Xidian University, Xi’an 710071; 2. School of Computer Science, Northwestern Polytechnical University, Xi’an 710072)
Abstract:This paper proposes a dynamic threshold secret sharing scheme. Each participant’s secret shadow is selected by the participant himself and the dealer need not deliver any secret information to each participant, so a secure channel between them is unnecessary. The shadows do not need to be changed when the shared secret is renewed, old participants are deleted or new participants are added. All these shadows are shorter than or as short as the shared secret. Each participant can share many secrets with other participants by holding only one shadow, and in the recovery phase, each participant is allowed to check whether another participant provides the true information. The scheme is based on the security of Shamir’s threshold scheme and the RSA cryptosystem. It is a computationally secure and efficient scheme.
Keywords:secret sharing  threshold scheme  security
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号