全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

一种门限秘密共享方案的安全性分析

Keywords: 秘密共享,门限方案,密码学

Full-Text   Cite this paper   Add to My Lib

Abstract:

为了更全面分析前向门限秘密共享方案的安全性,针对石润华等人提出的公开可验证的前向门限秘密共享方案,通过理论分析和实验验证发现该方案存在2个安全漏洞:门限值k不可信;攻击者利用公开的秘密更新算法可破解出秘密值S.同时,针对一般前向门限秘密共享方案给出了新的分析方法.该方法通过扩展前向门限秘密共享方案的完备性和秘密更新算法的单向性,使分析后的方案具有更强的安全性.

References

[1]  CHOR B,GOLDWASSER S,MICAL S,et al.Verifiable secret sharing and achieving simultaneity in the presence of faults[C]∥Proc of IEEE FOCS 85.New York:IEEE Press,1985:383-395.
[2]  PEDERSEN T P.Non-interactive and information-theoretic secure verifiable secret sharing[C]∥Proceeding of the 11thAnnual International Cryptology Conference.London:Springer-Verlag,1991,576:129-139.
[3]  GENNARO R,RABIN M,RABIN T.Simplified VSS and fast-track multiparty computations with applications to thresholdcryptography[C]∥Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing.NewYork:ACM Press,1998:101-111.
[4]  NIKOV V,NIKOVA S.On proactive secret sharing schemes[M]∥Lecture Notes in Computer Science.Berlin:SpringerVerlag,2004,3357:308-325.
[5]  ASAEDA H,RAHMAN M,TOYAMA Y.Structuring proactive secret sharing in mobile ad-hoc networks[C]∥InternationalSymposium on Wireless Pervasive Computer(ISWPC).Phuket,Thailand:IEEE,2006:1-6.
[6]  高照锋,叶延风,庄毅.基于椭圆曲线密码体制的先应式秘密共享方案[J].计算机技术与发展,2007,17(7):131-134.GAO Zhao-feng,YE Yan-feng,ZHUANG Yi.A proactive secret sharing scheme based on the elliptic curve cryptosystem[J].Computer Technology and Development,2007,17(7):131-134.(in Chinese)
[7]  HERZBERG A,JARECKI S,KRAWCZYK H.Proactive secret sharing or:how to cope with perpetual leakage[C]∥Coppersmith Advances in Cryptology CRYPTO 95.Berlin:Springer Verlag,1995:339-352.
[8]  石润华,黄刘生.一种新的门限秘密共享方案[J].合肥工业大学学报:自然科学版,2006,29(2):163-168.SHI Run-hua,HUANG Liu-sheng.A new threshold secret sharing scheme[J].Journal of Hefei University of Technology:Natural Science,2006,29(2):163-168.(in Chinese)
[9]  石润华,仲红,黄刘生.公开可验证的门限秘密共享方案[J].微电子学与计算机,2008,25(1):29-33.SHI Run-hua,ZHONG Hong,HUANG Liu-sheng.A public verifiable threshold secret sharing scheme[J].Microelectronics&Computer,2008,25(1):29-33.(in Chinese)

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133