共查询到20条相似文献,搜索用时 0 毫秒
1.
Keju MENG Fuyou MIAO Yu NING Wenchao HUANG Yan XIONG Chin-Chen CHANG 《Frontiers of Computer Science》2021,15(2):152801
If an adversary tries to obtain a secret s in a (t, n) threshold secret sharing (SS) scheme, it has to capture no less than t shares instead of the secret s directly. However, if a shareholder keeps a fixed share for a long time, an adversary may have chances to filch some shareholders’ shares. In a proactive secret sharing (PSS) scheme, shareholders are supposed to refresh shares at fixed period without changing the secret. In this way, an adversary can recover the secret if and only if it captures at least t shares during a period rather than any time, and thus PSS provides enhanced protection to long-lived secrets. The existing PSS schemes are almost based on linear SS but no Chinese Remainder Theorem (CRT)-based PSS scheme was proposed. This paper proposes a PSS scheme based on CRT for integer ring to analyze the reason why traditional CRT-based SS is not suitable to design PSS schemes. Then, an ideal PSS scheme based on CRT for polynomial ring is also proposed. The scheme utilizes isomorphism of CRT to implement efficient share refreshing. 相似文献
2.
针对目前理性秘密共享方案不能动态添加和删除参与者的问题,结合博弈论和密码学理论,提出一种动态理性秘密共享方案。方案基于中国剩余定理,在秘密重构过程,可以动态添加和删除参与者,另外方案采用可验证的随机函数,能检验参与者的欺骗行为。参与者不知当前轮是否是测试轮,偏离协议没有遵守协议的收益大,理性的参与者有动机遵守协议,最终每位参与者公平地得到秘密。方案不需要可信者参与,满足弹性均衡,能防止成员间的合谋攻击。 相似文献
3.
随着计算机网络的普及和应用,信息安全问题已经成为迫切解决的问题。传统的加密和信息隐藏已不能满足现代通信的需要。该文提出了一种新的基于混沌映射和密钥分享的叠像术,使得信息在网络上的传输更具有安全性。 相似文献
4.
5.
无人值守无线传感器网络(UWSN)通常部署在环境恶劣或敌对环境中,在静态汇聚节点(或基站)部署困难的情况下,感知节点无法完成感知信息的实时汇聚传输,需暂时维持感知数据的生存状态。为了增强数据生存的概率,提高感知数据的抗损坏、擦除和篡改能力,重点研究无人值守无线传感器网络中的数据加密生存问题,提出了一种基于中国剩余定理(CRT)多等级秘密共享的可靠数据生存方案。基于网络中节点的信誉模型,设计了节点权重密钥存储机制,增强了数据加密密钥分割存储的有效性,并结合基于中国剩余定理的秘密共享机制,提升了原有数据加密分发和恢复过程的效率。此外,还讨论了基于中国剩余定理的秘密共享方案具有的良好同态性质,并依此设计了子密钥组合运算方案,提高了数据加密生存方案中子密钥运算的安全性,进一步确保了数据生存方案的安全、可靠。 相似文献
6.
数字指纹技术可以追踪盗版拷贝的来源,在版权保护方面具有很重要的作用,受到越来越广泛的关注.本文提出了一种基于中国剩余定理的数字指纹体制,避免使用一般的安全多方计算协议,该方案不仅具有较好的实现效率,而且还能确定性地跟踪叛逆者. 相似文献
7.
8.
Guo Cheng Zhang Huan Fu Zhangjie Feng Bin Li Mingchu 《Multimedia Tools and Applications》2018,77(15):19569-19590
Multimedia Tools and Applications - In the traditional secret image sharing schemes, a dealer shares a secret image among a group of participants and an authorized subset of the participants with... 相似文献
9.
基于分段非线性混沌映射设计了一种流密码加密方案。用Logistic映射的输出作为分段非线性映射的分段参数,以Henon映射输出的混沌序列经运算后得到迭代次数,分段非线性混沌映射的输出与明文相加取模后生成密文。仿真实验和安全性分析表明,该方案的密钥空间大,对明文和密钥敏感,能有效抵抗穷举攻击、差分攻击和统计攻击,且实时性较好。 相似文献
10.
11.
We investigate a novel quantum secret sharing (QSS) based on the Chinese remainder theory (CRT) in multi-dimensional Hilbert space with the orbital angular momentum (OAM) entanglement analysis. The secret is divided and then allotted to two or more participants who prepare pairs of photons in the OAM-entanglement states. The initial secret can be restored jointly by legal participants via the OAM-entanglement analysis on the corresponding photons. Its security is guaranteed from the OAM entanglement of photons that are established through the spin angular momentum (SAM) entanglement analysis performed on the generated SAM-based OAM hybrid entanglement photons. It provides an alternative technique for the QSS while producing the OAM entanglement photons in the combined multi-dimensional OAM Hilbert space, where the CRT is conducted properly for sharing the conventional secret among legal participants. 相似文献
12.
Multimedia Tools and Applications - In this paper, a novel multiple-level secret image sharing scheme is proposed, which achieves the additional steganography, the authentication, and the scalable... 相似文献
13.
Shang-Lin Hsieh I-Ju Tsai Chung-Ping Yeh Chia-Ming Chang 《Multimedia Tools and Applications》2011,52(2-3):597-619
This paper presents an image authentication scheme that can verify the origin of the received image and, moreover, detect if the image has been tampered with. The underlying technologies of the scheme are digital watermarking and image secret sharing. Different from other schemes that use one piece of watermark information for one purpose and a different piece for another, the watermark information used for original verification is also utilized for tamper detection. Moreover, unlike other schemes that employ a fixed strength value for embedding watermarks, the scheme automatically utilizes two different strength values, one for flat regions and the other for complex regions. The experimental results prove that using different strength values increases the robustness of the watermark with little sacrifice in image quality. The results also demonstrate the effectiveness of the scheme for the origin verification as well as the tamper detection. 相似文献
14.
针对移动攻击,提出一种基于中国剩余定理(CRT)的动态门限签名方案。首先,成员交换影子产生各自的私钥和组公钥,然后由成员协作产生部分签名,最后通过部分签名合成签名。方案在签名过程中没有暴露组私钥,从而保证组私钥可重复使用;方案允许成员定期更新私钥,且组公钥不变,以保证更新前的签名仍然有效;此外,方案允许新成员加入,并保证老成员私钥和组私钥不会泄露。分析表明,该方案具有良好的前向安全性,能够有效地抵抗移动攻击;且理论分析和仿真实验结果表明,与基于Lagrange插值多项式方案相比,该方案更新时间消耗为常数级,时间效率较高。 相似文献
15.
16.
《中国科学:信息科学(英文版)》2012,(7):1605-1616
The wireless physical channel parameters are recently used to provide secret key.However,the key generation usually suffers from the quantization errors due to the noise,which decreases the key agreement ratio (KAR) between authorized users.Most existing approaches achieve high KAR by discarding some channel parameters which may lower the key generation efficiency and therefore lower the encryption strength.In the frequency-division duplex (FDD) systems,the number of reciprocal parameters,such as the multipath angle and delay,is limited.Therefore how to find a quantization method with high KAR and encryption strength is one of the major problems for secret key generation in FDD systems.In this paper,a robust quantization scheme based on grouping and shifting is proposed,in which all the available parameters are used for key generation.In addition,a key mapping method with error correction based on Chinese remainder theorem (CRT) is proposed to further improve the KAR performance.Simulations demonstrate the effectiveness of the proposed method. 相似文献
17.
在群签名方案中,群中的任意一个合法群成员都可以代替整个群组对某个消息进行签名,验证者只能验证签名者属于该群组中的一员,但不能得知签名者的具体身份。提出一个基于中国剩余定理的前向安全群签名方案。该方案可以动态地增加和删除群用户成员而无须频繁更改群公钥,并在验证签名和打开签名时只需要进行模运算即可实现,同时针对密钥泄露问题实现了前向安全性。最后对方案进行了安全性分析和效率分析,结果表明该方案具有匿名性、可撤销性、防伪造性和追踪性。 相似文献
18.
Zarepour-Ahmadabadi Jamal Shiri-Ahmadabadi MohammadEbrahim Latif Alimohammad 《Multimedia Tools and Applications》2018,77(18):24073-24096
Multimedia Tools and Applications - A new Multi-Stage Multi-Secret Image Sharing (MSMSIS) scheme, based on polynomial sharing and cellular automata, is proposed in this paper. The proposed scheme... 相似文献
19.
从数论中的中国剩余定理出发,在分析基于多项式上的中国剩余定理的基础上,提出了一种新的通信编码。该方案对传统的中国剩余定理通信编码方案进行了改进,使得信息在传输时更加安全可靠仿真实验证明了该编码方案大大提高了传输速率,减轻了信道上的负荷。 相似文献
20.
Innovations in Systems and Software Engineering - This paper proposes a fully homomorphic computational model for secret sharing. The backbone of the proposed model is Chinese remainder theorem.... 相似文献