首页 | 本学科首页   官方微博 | 高级检索  
     检索      

一种防欺骗的广义多秘密分享方案
引用本文:黄挚雄,黎群辉,危韧勇,李志勇.一种防欺骗的广义多秘密分享方案[J].铁道学报,2007,29(6):52-56.
作者姓名:黄挚雄  黎群辉  危韧勇  李志勇
作者单位:中南大学,信息科学与工程学院,湖南,长沙,410075
基金项目:国家自然科学基金;湖南省自然科学基金
摘    要:秘密分享是信息安全和密码学的重要研究课题,对通信密钥管理和计算机网络安全具有重要意义。本文针对现有的多秘密分享方案不能有效地防止分发者和分享者的欺骗,以及子秘密恢复时计算复杂量大等问题,在基于离散对数与因式分解难题上,提出一种具有广义接入结构的高效的多秘密分享方案。该方案具有如下特点:可高效地检测秘密管理者与分享者的欺诈行为;秘密管理者只需公开少量数据就可动态地增加一个新子秘密;采用并行算法恢复子秘密;可高效地增加或删除成员,无需重新计算其他成员的秘密份额。该方案可在分布式会议秘密分配、安全分布式计算、电子商务等领域应用。

关 键 词:秘密分享  接入结构  因式分解问题  离散对数
文章编号:1001-8360(2007)06-0052-05
收稿时间:2006-01-05
修稿时间:2006-04-20

A Generalized Multi-secret Sharing Scheme to Identify Cheaters
HUANG Zhi-xiong,LI Qun-hui,WEI Ren-yong,LI Zhi-yong.A Generalized Multi-secret Sharing Scheme to Identify Cheaters[J].Journal of the China railway Society,2007,29(6):52-56.
Authors:HUANG Zhi-xiong  LI Qun-hui  WEI Ren-yong  LI Zhi-yong
Abstract:Secret sharing is an important research area in information security and cryptography,which is significant to managing communication keys and ensuring the safety of computer networks.Most previous multi-secret sharing schemes have problems in efficiently detecting the cheating of either the dealer or shadowholders and in carrying out complex and large-amount computation for secret recovery.The authors have designed an efficient multi-secret sharing scheme with a generalized access structure on the basis of dealing with the difficulty of computing the discrete logarithm modulo for a composite number and the factorization problem of a large integer.The proposed scheme has the following properties:(1)Cheating of the dealer or any participant can be detected efficiently;(2)a new secret can be added on the bulletin by the dealer at any time on condition that small-amount of data are made public;(3) the participants can reconstruct a secret with the parallel procedure in a secret recovery phase;(4)the shadows of the participants will not change when the system accepts a new participant or fires an old participant.This scheme will find wide applications in conferences distributed secretly,securely-distributed computation and electronic commerce.
Keywords:secret sharing  access structure  factorization problem  discrete logarithm
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号