首页 | 本学科首页   官方微博 | 高级检索  
     

一种有效的可验证的门限多秘密分享方案
引用本文:甘元驹,彭银桥,沈玉利,施荣华.一种有效的可验证的门限多秘密分享方案[J].计算机工程与设计,2005,26(8):1994-1996.
作者姓名:甘元驹  彭银桥  沈玉利  施荣华
作者单位:湛江海洋大学,信息学院,广东,湛江,524088;中南大学,信息工程学院,湖南,长沙,410075
基金项目:国家自然科学基金项目(60173041);广东省科技基金项目(20041190067).
摘    要:针对多数秘密共享方案不能同时防止秘密管理者和秘密成员的欺骗,以及子秘密重构时计算量大等问题,提出了一种安全有效的解决方案。在该方案中,每个分享者只需拥有一个秘密影子就可以和其它分享者共享多个秘密信息,此外,方案提供了有效抵御秘密管理者欺骗和成员欺骗的解决方法。方案的安全性是基于求离散对数和RSA大整数因式分解的困难性。与其它已有的方案相比,此方案的优点在于计算量低和子秘密重构时采用了并行算法。

关 键 词:密码学  秘密共享  因式分解  离散对数  欺骗
文章编号:1000-7024(2005)08-1994-03
收稿时间:2004-10-09
修稿时间:2004-10-09

Efficient and verifiable threshold multi-secret sharing scheme
GAN Yuan-ju,PENG Yin-qiao,SHEN Yu-li,SHI Rong-hua.Efficient and verifiable threshold multi-secret sharing scheme[J].Computer Engineering and Design,2005,26(8):1994-1996.
Authors:GAN Yuan-ju  PENG Yin-qiao  SHEN Yu-li  SHI Rong-hua
Abstract:Most previous secret sharing schemes have some problems in which the schemes can not deter the cheating of the dealer and secret shadowholders simultaneously, and the computation in a secret recovery is overhead. A secure and efficient solving scheme was proposed. Each participant can share many secrets with other participants by holding only one shadow in the proposed scheme. This new scheme provides efficient solutions against cheating of the dealer and cheating of any participant. The security of the proposed scheme is based on the difficulty of computing the discrete logarithm modulo for a composite number and the factorization problem of a large integer. Compared with the other existing schemes, the proposed scheme has the advantages of lower computation and the parallel reconstruction in a secret recovery phase.
Keywords:cryptography  secret sharing  factorization  discrete logarithm  cheating
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号