期刊文献+

基于LUC密码体制防欺诈的秘密共享方案 被引量:3

A Secret Sharing Scheme with Ability to Identify Cheaters Based on LUC Cryptosystem
在线阅读 下载PDF
导出
摘要 基于LUC密码体制,提出一种防欺诈的(t,n)门限秘密共享方案。在秘密恢复过程中,任何参与者能够对其他参与者所出示的子秘密进行验证,不仅能有效地阻止敌手窃取秘密,也能有效地防止内部成员之间的相互欺骗;各参与者的子秘密长度与秘密长度相同,方案的信息率为1,是一个理想的方案。该方案的安全性是基于LUC密码体制和Shamir的(t,n)门限秘密共享方案的安全性。 Secret sharing plays an important role in information security and data privacy, Based on LUC cryptosystem, a (t, n) threshold secret sharing scheme is proposed in this paper, which has the capability to identify cheater. In the secret recovery phase, each participant is allowed to check whether another participant provides the true share or not, which can prevent adversaries from getting the secret and the participants cheating each other efficiently. Each participant's share is as short as the shared secret. Therefore, this scheme is an ideal one with the information rate 1. The security of this scheme is based on that of the LUC cryptosystem and Shamir's (t, n) threshold secret sharing scheme.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2007年第1期108-111,共4页 Journal of University of Electronic Science and Technology of China
基金 国家973计划资助项目(G1999035804) 军事通信技术预研项目
关键词 密码学 信息安全 秘密共享 门限方案 cryptography information security, secret sharing, threshold scheme
  • 相关文献

参考文献9

  • 1SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22:612-613.
  • 2BLAKLEY G.Safeguarding cryptographic keys[C]// In:Proc.AFIPS 1979 Natl.Conf.,New York,1979:313-317.
  • 3YANG C C,CHNAG T Y,HWANG M S.A (t,n) multisecret sharing scheme[J].Applied Mathematics and Computation,2004,151 (2):483-490.
  • 4RABIN T,BEN-Or M.Verifiable secrets sharing and multiparty protocols with honest majority[C]// In:Proceedings of the 21st Annual ACM Symposium on Theory of Computing,New York,1989:73-85.
  • 5张建中,肖国镇.一个可防止欺诈的秘密分享方案[J].电子科学学刊,1999,21(4):516-521. 被引量:12
  • 6费如纯,王丽娜.基于RSA和单向函数防欺诈的秘密共享体制[J].软件学报,2003,14(1):146-150. 被引量:41
  • 7许春香,魏仕民,肖国镇.定期更新防欺诈的秘密共享方案[J].计算机学报,2002,25(6):657-660. 被引量:27
  • 8SMITH P.LUC public-key encryption:A secure alternative to RSA[J].Dr.Dobb's Joumal,1993,18(1):44-49.
  • 9RIVEST R L,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public key cryptosystem[J].Communication of the ACM,1978,21(2):120-126.

二级参考文献7

共引文献72

同被引文献33

引证文献3

二级引证文献88

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部