首页 | 本学科首页   官方微博 | 高级检索  
     

适合P2P环境的动态多秘密共享方案
引用本文:鲍洋,卢正鼎,黄保华,李瑞轩,胡和平,路松峰. 适合P2P环境的动态多秘密共享方案[J]. 计算机科学, 2010, 37(9): 40-43
作者姓名:鲍洋  卢正鼎  黄保华  李瑞轩  胡和平  路松峰
作者单位:华中科技大学计算机学院,武汉,430074
基金项目:国家自然科学基金委员会和中国工程物理研究院联合基金 
摘    要:P2P环境中缺少可信的第三方,节点上线率相对较低,而且网络成员与网络规模都处于不断的变动中,这些特性使现有的多秘密共享方案无法有效地工作.针对P2P环境的特点,提出了一种动态多秘密共享方案.首先,该方案无需可信分发者和安全通讯信道,且在保持密文不变的前提下参与者的身份、数量及系统门限值均能动态改变.其次,采用Byzantine Quorum方式在DHT上管理参与者的身份与验证信息,使秘密重构与改变系统参数的操作只需门限个参与者同时在线即可完成.再次,使用基于身份的公钥密码系统与二元多项式,减小了消息开销,同时得以有效地对抗成员欺骗.因此,提出的动态多秘密共享方案能较好地应用于P2P环境.

关 键 词:对等网  多秘密共享  基于身份的公钥密码系统  门限方案

Dynamic Multi-secret Sharing Scheme for P2P Environment
BA Yang,LU Zheng-ding,HUANG Bao-hu,LI Rui-xuan,HU He-ping,LU Song-feng. Dynamic Multi-secret Sharing Scheme for P2P Environment[J]. Computer Science, 2010, 37(9): 40-43
Authors:BA Yang  LU Zheng-ding  HUANG Bao-hu  LI Rui-xuan  HU He-ping  LU Song-feng
Affiliation:(College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China)
Abstract:Lack of a trusted third party, relatively low node availability and constantly changing membership and network size,make existing multi-secret schemes unsuitable for P2P environment A dynamic multi-secret sharing scheme was proposed for P2P networks. Neither trusted dealers nor secure communication channels are necessary for the proposed scheme, which allows dynamic changes of participants and the system threshold in keeping ciphertext untouched. In the meantime, the participants' identity and public commitments together with system parameters are managed by Byzantine Quorums, which makes it possible to reconstruct a shared secret, add a participant or change the system threshold with only threshold participants online. Additionally,II}based public key cryptosystem and bivariate polynomials are used to reduce message traffic and deal with participant cheating. Altogether, the proposed scheme overcomes the drawbacks of the previous schemes in P2P environment.
Keywords:Peer-to-peer network   Multiple secret sharing   ID-based public key cryptosystem   Threshold scheme
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号