首页 | 本学科首页   官方微博 | 高级检索  
     

不同权限下自证实的多秘密共享方案
引用本文:邹惠,王建东.不同权限下自证实的多秘密共享方案[J].计算机工程与应用,2011,47(7):93-95.
作者姓名:邹惠  王建东
作者单位:石家庄经济学院 信息工程学院,石家庄 050031
摘    要:为了解决现有不同权限下秘密共享方案中子秘密的安全分发问题,利用双一元多项式,结合基于身份的公钥密码技术,提出一种新的基于不同权限的门限秘密共享方案,并给出其推广形式。该方案中,子秘密由秘密分发者和参与者分别生成,参与者的子秘密可反复使用,共享任意多个秘密。任何人可验证参与者身份和子秘密的合法性,有效防止参与者欺诈。分析表明,新方案不仅安全,而且效率也优于已有文献。

关 键 词:密钥交换  多秘密共享  不同权限  基于身份的公钥密码技术  
修稿时间: 

Self-certified threshold multi-secret sharing scheme under different access right
ZOU Hui,WANG Jiandong.Self-certified threshold multi-secret sharing scheme under different access right[J].Computer Engineering and Applications,2011,47(7):93-95.
Authors:ZOU Hui  WANG Jiandong
Affiliation:School of Information Engineering,Shijiazhuang University of Economics,Shijiazhuang 050031,China
Abstract:In order to solve the secure distribution problems in the existing secret sharing scheme under different access right,based on the ID-based public key cryptography technology,a new secret sharing scheme under different access right is proposed,which adopts two polynomials,and then a generalized scheme is given.In the scheme,each participant’s share is selected by the participant himself and secret dealer separately;the shares can be repeatedly used for the reconstruction of multiple secrets.The cheating between participants can be detected by verifying every participant’s identity and share.Analysis shows the proposed scheme is secure.Furthermore,its efficiency is also better than others.
Keywords:key exchange  multi-secret sharing  different access right  ID based public key cryptography technology
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号