首页 | 本学科首页   官方微博 | 高级检索  
     

基于多项式插值的门限函数秘密分享方案
引用本文:罗景龙,林昌露,李朝珍,张剑.基于多项式插值的门限函数秘密分享方案[J].计算机系统应用,2020,29(5):29-35.
作者姓名:罗景龙  林昌露  李朝珍  张剑
作者单位:福建师范大学数学与信息学院,福州 350117;福建师范大学福建省网络安全与密码技术重点实验室,福州 350007
基金项目:国家自然科学基金(U1705264,61572132);福建省自然科学基金(2019J01275)
摘    要:针对现存的函数秘密分享方案在重构的过程中需要所有的参与者全部参与,不能灵活地适用于现实场景的问题,本文运用多项式技术构造了含有门限的函数秘密分享方案.按照函数秘密分享的安全模型证明了新构造的方案具有信息论意义下的安全性.此外本文分析了Yuan等学者提出的函数秘密分享方案,阐述了其方案不满足函数秘密分享方案安全性的原因.最后将本文构造的方案与现有的函数秘密分享方案进行了比较,发现其具有更高级别的安全性和更高的效率.

关 键 词:秘密分享  函数秘密分享  私密信息恢复  多项式插值  安全性分析
收稿时间:2019/9/28 0:00:00
修稿时间:2019/10/29 0:00:00

Threshold Function Secret Sharing Scheme Based on Polynomial Interpolation
LUO Jing-Long,LIN Chang-Lu,LI Chao-Zhen,ZHANG Jian.Threshold Function Secret Sharing Scheme Based on Polynomial Interpolation[J].Computer Systems& Applications,2020,29(5):29-35.
Authors:LUO Jing-Long  LIN Chang-Lu  LI Chao-Zhen  ZHANG Jian
Affiliation:College of Mathematics and informatics, Fujian Normal University, Fuzhou 350117, China;Fujian Provincial Key Lab of Network Security & Cryptology, Fujian Normal University, Fuzhou 350007, China
Abstract:Since the existing function secret sharing schemes require all participants to join in the reconstruction phase. Therefore, it cannot be flexibly applied to real-world scenarios. A function secret sharing scheme with thresholds is constructed in this study using polynomial techniques. According to the security model of function secret sharing, we proved that the proposed scheme has security in the sense of information theory. In addition, this study analyzes the function secret sharing scheme proposed by Yuan et al., and expounds the reason why their scheme does not satisfy the security of function secret sharing. Finally, a comprehensive comparison between the newly constructed scheme and the existing function secret sharing scheme is found. We note that the newly constructed scheme has higher level of security and higher efficiency through the comprehensive comparison.
Keywords:secret sharing  function secret sharing  private information retrieval  polynomial interpolation  security analysis
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机系统应用》浏览原始摘要信息
点击此处可从《计算机系统应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号