全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

可验证的多策略秘密共享方案

DOI: 10.13190/jbupt.201006.72.wangf, PP. 72-75

Keywords: 秘密共享,验证性,多策略,密钥管理

Full-Text   Cite this paper   Add to My Lib

Abstract:

可验证多重秘密共享方案普遍不能区分共享群组密钥的安全等级,即分享群组密钥的门限值相等,为此,提出了一种可验证的多策略秘密共享方案.在该方案中,密钥分发者能根据分发群组密钥的安全等级选择不同的门限值;在群组密钥分发和重构过程中,能实现参与者对密钥分发者和重构者对参与者的验证,及时检测和识别密钥分发者对参与者以及参与者对密钥重构者的欺骗,从而提高重构群组密钥的成功率;参与者的子密钥能重复使用,可减少密钥分发者的计算负担,提高方案的效率.该方案具有较高的安全性和实用性.

References

[1]  Shamir A. How to share a secret[J]. Communication of the ACM, 1979, 22(11): 612-613.
[2]  Blakley G. Safeguarding cryptographic keys//Proc AFIPS 1979 NCC. New York: AFIPS Press, 1979: 313-317.
[3]  张劼, 刘振华, 温巧燕. 严格k-欺骗免疫秘密共享[J]. 北京邮电大学学报, 2007, 30(2): 24-27. Zhang Jie, Liu Zhenhua, Wen Qiaoyan. Strictly k-cheating immune secret sharing[J]. Journal of Beijing University of Posts and Telecommunications, 2007, 30(2): 24-27.
[4]  Dong Y, Go H W, Sui A F, et al. Providing distributed certificate authority service in mobile ad hoc networks//SecureComm 2005. Athens: , 2005: 149-156.
[5]  于佳, 郝容, 孔凡玉, 等. 先动的可公开验证服务器辅助秘密共享[J]. 北京邮电大学学报, 2008, 31(5): 13-17. Yu Ja, Hao Rong, Kong Fanyu, et al. Proactive and publicly verifiable server-assisted secret sharing[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(5): 13-17.
[6]  Chang T Y, Hwang M S, Yang W P. A new multi-stage secret sharing scheme using one-way function[J]. Association for Computing Machinery, 2005, 39(1): 48-55.
[7]  Chang T Y, Hwang M S, Yang W P. An improvement on the Lin-Wu (t,n)-threshold verifiable multi-secret sharing scheme[J]. Applied Mathematics and Computation, 2005, 163(1): 169-178.
[8]  Fouque P A, Poupard G, Stern J. Sharing decryption in the context of voting or lotteries//FC 2000. Berlin: Springer Verlag, 2000: 90-94.
[9]  Ray I, Narasimhamurthi N. An anonymous electronic voting protocol for voting over the Internet//WECWIS01. Los Alamitos: IEEE Computer Society, 2001: 188-190.
[10]  Geng Yongjun, Fan Xiahong, Hong Fan. A new multi-secret sharing scheme with multi-policy//ICACT07. Phoenix Park: National Computerization Agency, 2007: 1515-1517.
[11]  Lin Hanyu, Yeh Y S. Dynamic multi-secret sharing scheme[J]. International Journal of Contemporary Mathematical Sciences, 2008, 3(1): 37-42.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133