作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2010, Vol. 36 ›› Issue (7): 126-128. doi: 10.3969/j.issn.1000-3428.2010.07.043

• 安全技术 • 上一篇    下一篇

3个秘密共享方案的弱点分析与改进

张建中,屈 娟   

  1. (陕西师范大学数学与信息科学学院,西安 710062)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2010-04-05 发布日期:2010-04-05

Weaknesses Analysis and Improvement of Three Secret Sharing Schemes

ZHANG Jian-zhong, QU Juan   

  1. (College of Mathematics and Information Science, Shaanxi Normal University, Xi’an 710062)
  • Received:1900-01-01 Revised:1900-01-01 Online:2010-04-05 Published:2010-04-05

摘要: 通过对秘密共享的研究与分析,发现现有的秘密共享方案几乎都有其弱点,导致这些方案不能在实际中得到应用。分析3个秘密共享方案,指出它们各自存在的安全漏洞,并通过系统初始化、秘密份额生成和验证、秘密承诺生成和恢复等对刘锋等人的方案(计算机应用研究,2008年第(1)期)进行改进。结果表明,改进后的方案克服了原有方案的缺点,是一个安全的可验证的秘密共享方案。

关键词: 秘密共享, 主动攻击, 欺诈, 可验证

Abstract: Through the research and analysis of secret sharing, it is found that all the existing secret sharing schemes have weaknesses, thus results in these schemes be not applied. Three secret sharing schemes are analyzed and the secure hole of them is pointed, through system initialization, secret part building and validating, secret acceptance building and recovery, Liufeng et al scheme(application research computers, 2008,(1)) is improved. Result shows that the improved scheme overcomes the security problem of the original scheme, and it is a safe verifiable secret sharing scheme.

Key words: secret sharing, active attack, cheating, verifiable

中图分类号: