期刊文献+

权重不同参与者之间的秘密共享(英文) 被引量:20

Secret Sharing among Weighted Participants
在线阅读 下载PDF
导出
摘要 秘密共享方案允许一个秘密在多个参与者之间共享,但是只有合格的参与者子集才能恢复共享的秘密。秘密共享在密码学中的密钥管理上非常有用。基于不同身份,我们分析了权重不同参与者之间的秘密共享,提出了权重不同参与者之间的秘密共享方案。然后我们提出了一个有关权重不同参与者之间的秘密共享的Ramp方案,证明该方案是不完全的,并给出例证。最后,我们提出权重不同参与者之间的秘密共享方案,该方案可以以高概率防止欺骗。 A secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret. Secret sharing schemes are useful in management of cryptographic keys. Based on identity, we analyze the secret sharing scheme among weighted participants and present a secret sharing scheme bout it. Then we present a ramp scheme about secret sharing scheme among weighted participants. It is proved that the ramp scheme is not perfect and an instance is provided. At last, we prosent a secret sharing scheme among weighted participants, which can prevent cheating strategies with high probability.
出处 《北京电子科技学院学报》 2005年第2期1-8,共8页 Journal of Beijing Electronic Science And Technology Institute
基金 Partially supported by Natural Science Foundation of China (10371127)and by 973 projects (G1998030600 and G1999035802)
关键词 秘密共享 防止欺骗 权重 中国剩余定理 secret sharing, preventing cheating, weighted, Chinese remainder theorem
  • 相关文献

参考文献11

  • 1[1]G.R Blakey. Safeguarding Cryptographic Keys. Proc. NCC, AFIPS Press, Montvale, 1979,48: 313-317.
  • 2[2]G. R. Blakely and C. Meadows. Security of Ramp Schemes, Crypto'84, Lecture Notes inComputer Sciences 196, pp411-431.
  • 3[3]R. M. Capocelli, A. De Santis, L. Garganos etc. On the Size of Shares for Secret Sharing Schemes[J]. Journal of Cryptology,Vol.6, 1993, 157-167.
  • 4[4]J. Gathen and J. Gerharad, Modern Computer algebra[M]. Cambridge university press, 1999.
  • 5[5]J. He and E. Dawson. Shared Secret Reconstruction, Designs, Codes and Cryptography, 14, 221-237 (1998).
  • 6[6]John D. Lipson. Chinese Remainder and Interpolation algorithm, Proceedings of ACM Symposium on Symbolic and Algebraic Computation[M]. ACM Press, 1971.372-391.
  • 7[7]C. Padro,G. Saez, and J. Villar. Detection of Cheaters in Vector Space Secret Sharing Schemes,Designs,Codes and Cryptography.16, 75-85 (1999).
  • 8[8]A. Shamir. How to share a secret[J]. Communication of ACM, 1979,22: 612-613.
  • 9[9]G. J. Simmons. An introduction to shared secret/or shared control schemes and their applications, Contemporary Cryptology:The science of information integrity. IEEE Press,1992. 441-497.
  • 10[10]D. R. Stinson. Cryptography: Theory and Practice[M]. CRC Press, 1995.

同被引文献59

引证文献20

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部