首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
乔晓林  张建中 《计算机工程》2010,36(22):143-144
基于Shamir门限方案和RSA密码体制提出一种动态门限多组秘密共享方案。该方案中的多秘密分发者可根据所共享秘密的重要性,动态调整恢复该秘密时的门限值,使 组秘密根据不同的门限值在 个参与者中共享。方案可以灵活地增加或删除成员,无需更改其他成员的秘密份额。任何人可在秘密重构阶段验证每个合作的参与者是否进行欺诈,且无需专门的验证协议。  相似文献   

2.
一个动态门限多重秘密共享方案   总被引:3,自引:0,他引:3       下载免费PDF全文
提出一个动态多重秘密共享方案,参与者的秘密份额由参与者自己选定,每个参与者只需维护一个秘密份额就可以实现对任意多个秘密的共享,并且一次可以共享多个秘密。在秘密恢复过程中,每个参与者都可以验证其他合作者是否存在欺诈行为;在参与者间不需要安全信道;当秘密更新、参与者加入或退出系统时,各参与者的份额无需更新。分析表明,该方案是一个安全、实用的秘密共享方案。  相似文献   

3.
基于中国剩余定理提出一种无可信中心可验证门限签名秘密共享方案。该方案无需可信中心的参与,每个成员被视为分发者,通过相互交换秘密份额影子协同产生各自的秘密份额,从而避免可信中心的权威欺骗。成员利用自己的秘密份额产生部分签名,再由部分签名合成组签名,在签名过程中不直接利用或暴露组私钥,从而保证组私钥的可重用性。基于离散对数求解困难性,构造秘密份额影子验证式,从而识别成员之间的欺骗行为,有效防止成员之间的恶意欺诈。实验结果表明,与基于拉格朗日插值的秘密共享方案相比,该方案具有较高的计算效率。  相似文献   

4.
对一种VMSS方案的分析与改进   总被引:1,自引:0,他引:1  
多秘密共享方案是指一次可共享多个秘密的秘密共享方案。Massoud Hadian Dehkordi和Samaneh Mashhadi提出了一个有效的可验证多秘密共享方案(DM-VMSS)。该方案无需安全通道,且各参与者自己选择各自的秘密份额,故无需验证秘密分发者的诚实性。对DM-VMSS方案进行了安全性分析,首先指出该方案的一个安全缺陷,即:秘密分发者虽无法通过伪造各参与者的秘密份额进行欺骗,但可通过公开无效的函数值使得参与者恢复无效的秘密,而对秘密分发者的这种行为参与者无法察觉。然后对原方案进行改进,在验证阶段加入可检验出秘密分发者的欺骗行为的验证方程,以避免上述安全缺陷和攻击。  相似文献   

5.
《计算机工程》2017,(7):163-169
现有向量空间上的秘密共享方案不能实现秘密份额更新和成员数量动态的增加与删除,且很难保证可信中心的存在。为此,提出一种无可信中心的动态多秘密共享方案。秘密份额由所有参与者共同协商产生,不需要可信中心参与,利用双线性对的性质,任何人都能验证分发的秘密份额和更新的秘密份额的正确性。将共享的秘密用一个构造的公开函数进行表示,在重构过程中,参与者通过公开函数可以对多个秘密进行重构。成员的加入与删除由其他成员共同决定,采用老成员协助新成员生成秘密份额的方式,实现成员的动态管理。对该方案进行正确性与安全性证明,与其他向量空间秘密共享方案相比,具有更高的安全性、动态性和使用效率。  相似文献   

6.
针对现有的多秘密共享方案不能同时满足秘密份额的动态更新和可公开验证性的问题, 提出一种可公开验证可更新的多秘密共享方案。该方案利用单向散列链构造更新多项式, 使得参与者的秘密份额能够定期更新, 并且在秘密分发的同时生成验证信息, 任何人都可以根据公开信息对秘密份额和更新份额的有效性进行验证, 及时检测成员之间的相互欺诈行为。分析表明, 在椭圆曲线上的离散对数问题和计算性Diffie-Hellman问题困难的假设下, 该方案能有效地抵抗内外部攻击, 具有较好的安全性。  相似文献   

7.
基于Massy的秘密共享体制和RSA密码体制,提出一个可验证的多秘密共享方案。在秘密共享阶段,参与者的份额由各个参与者自己选取,且其子秘密的传送可以通过公开的信道发送给秘密分发者。在秘密恢复阶段,可以验证参与者是否进行欺骗。该方案可以动态地更新秘密,无需更改参与者的秘密份额,只需更改公告牌上的部分相应信息。与以往的 门限秘密共享方案相比,该方案具有更丰富的授权子集。  相似文献   

8.
陈勤  陈达  张旻  徐坤 《计算机工程》2010,36(12):159-161
基于椭圆曲线上的双线性映射,提出一种(t, n)门限多重秘密共享方案。在该方案中,每个参与者持有的秘密份额由参与者自己选择,且维护一份秘密份额即可实现对多个秘密的共享。该方案无需存在固定的秘密分发者,也无需存在各参与者之间的秘密通道,通信在公共信道上进行,且分发一个共享秘密仅需公布3个公共值。在方案的实现过程中,能及时检测参与者之间的欺骗行为,验证秘密的正确性,具有较高的安全性和实用性。  相似文献   

9.
文章提出了一种可用于云存储场景的多秘密共享方案,该方案基于门限密码学和主动安全技术,旨在保证数据在较长时间内的存储安全。该方案首先将用户上传的机密数据拆分成多个秘密,并对这些秘密进行秘密共享。然后选择不同的云服务提供商对共享后的影子份额分别进行存储,从而满足(k,n)阈值方案的安全性。在这个过程中,秘密分发者负责对秘密进行分发和共享,并确保每个云服务提供商只持有一部分数据的影子份额。为了保证系统的安全性,该方案在份额更新和验证阶段采用周期性的策略,使得攻击者只有在一个更新周期内攻破不小于k个云服务提供商,才能获取原秘密或关于它的信息。该方案不仅避免了各云服务商之间的直接交互,降低了云存储服务商间的通信交互代价,而且采用门限密码学和主动安全技术,保证了系统的安全性和数据的长时安全存储。通过与其他方案的对比分析证明了文章所提方案效率更高,更适合存储大规模秘密数据。  相似文献   

10.
现有自选子秘密的可验证秘密共享方案,不能同时实现对子秘密的更新和公开验证。为此,基于双线性对提出一种可公开验证可更新多秘密共享方案。参与者选取子秘密,影子秘密参与重构,不会泄漏真实的秘密份额;利用单向散列链,实现对影子秘密的更新;任何人均可对影子秘密的正确性和公开信息的有效性进行公开验证;分析方案的正确性,并与现有方案进行性能比较,而且在随机预言模型下证明方案的安全性。分析表明,在离散对数问题和计算Diffie-Hellman问题假设下,所提方案是安全有效的。  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

18.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

19.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

20.
Abstract  This paper considers some results of a study designed to investigate the kinds of mathematical activity undertaken by children (aged between 8 and 11) as they learned to program in LOGO. A model of learning modes is proposed, which attempts to describe the ways in which children used and acquired understanding of the programming/mathematical concepts involved. The remainder of the paper is concerned with discussing the validity and limitations of the model, and its implications for further research and curriculum development.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号