首页 | 本学科首页   官方微博 | 高级检索  
     

一种可验证和高效的多秘密共享门限方案
引用本文:步山岳,王汝传. 一种可验证和高效的多秘密共享门限方案[J]. 计算机科学, 2011, 38(1): 100-103
作者姓名:步山岳  王汝传
作者单位:1. 淮阴工学院计算机工程学院,淮安,223002
2. 南京邮电大学计算机学院,南京,210003
基金项目:本文受国家自然科学基金项目(60973139)资助。
摘    要:已公开的门限多秘密共享方案大都是利用RSA,ECC等公钥体制来提高安全性,其占用的资源较多,速度慢。提出了一种新的多秘密共享(t, n)门限方案,该方案是在shamir秘密共享方案的基础上,利用拉格朗日插值多项式方法进行秘密分割和重构,利用NTUR算法和单向散列函数进行数据合法性验证。方案设计简单、计算量小、存储量少,能有效检测出各种欺骗、伪造行为,以确保恢复的秘密是安全和可信的。

关 键 词:多秘密共享,NTUR算法,门限方案,可验证

Verifiable and Efficient Multi-secret Sharing Threshold Scheme
BU Shan-yue,WANG Ru-chuan. Verifiable and Efficient Multi-secret Sharing Threshold Scheme[J]. Computer Science, 2011, 38(1): 100-103
Authors:BU Shan-yue  WANG Ru-chuan
Affiliation:(School of Computer Engineering, Huaiyin Institute of Technology, Huaian 223002,China);(College of Computer,Nanjing University of Post & Telecommunications,Nanjing 210003,China)
Abstract:In most of the multi-secret sharing schemes already published, RSA, ECC or other public key cryptosystems are used to improve security. But such schemes would take up lots of resources and result in low speed. We proposed a new multi secret sharing(t, n) threshold scheme based on shamir secret sharing scheme, using the Lagrange interpolating polynomial to split and reconstruct the secrets and the NTRU and oncway hashing function to verify the validity of data. The scheme is simple in design and requires limited calculation and limited storage space. It can detect effectively a variety of cheating or forgery behaviors and guarantee that the reconstruction of the secret is the secure and trustworthy.
Keywords:Multi secret sharing   NTRU algorithm   Threshold scheme   Verifiable
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号