作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2010, Vol. 36 ›› Issue (16): 135-136. doi: 10.3969/j.issn.1000-3428.2010.16.049

• 安全技术 • 上一篇    下一篇

基于ElGamal体制的门限秘密共享方案

王天成1,张建中2   

  1. (1. 青海师范大学民族师范学院,西宁 810008;2. 陕西师范大学数学与信息科学学院,西安 710062)
  • 出版日期:2010-08-20 发布日期:2010-08-17
  • 作者简介:王天成(1971-),男,副教授、硕士,主研方向:代数组合,密码学;张建中,教授、博士
  • 基金资助:
    国家自然科学基金资助项目(10571113);教育部高等学校第二类特色专业建设点基金资助项目(TS2413)

Threshold Secret Sharing Scheme Based on ElGamal Cryptosystem

WANG Tian-cheng1, ZHANG Jian-zhong2   

  1. (1. Teachers College of Nationalities, Qinghai Normal University, Xining 810008; 2. College of Mathematics and Information Science, Shaanxi Normal University, Xi’an 710062)
  • Online:2010-08-20 Published:2010-08-17

摘要: 基于Shamir 的门限方案和ElGamal密码体制,采用Lagrange插值法进行秘密拆分和恢复,提出一个动态多重秘密共享方案。参与者的秘密份额由各参与者自己选择,在参与者间不需要维护一条安全信道,并且一次可以共享多个秘密。当秘密更新、参与者加入或退出系统时,各参与者的份额不需要更新。在秘密重构过程中,合法的参与者或攻击者试图出示假的子秘密来欺骗秘密生成者是不可行的。该方案实现了动态 门限秘密共享时不需要重新构造多项式,使计算量开销更小。

关键词: 动态秘密共享, 多重秘密共享, ElGamal密码体制, 安全

Abstract: Based on Shamir’s threshold scheme and ElGamal cryptosystem, by using Lagrange interpolation method and the restoration of secret splitting, this paper proposes a dynamic multi-secret sharing scheme. Participants share the secret of their choice by the participants, among the participants do not need to maintain a safe channel, and a number of secrets can be shared. When the secrets update, and the participants join or exit the system, each participant’s share does not require updates. In the secret reconstruction process, the legitimate participants or the attacker try to produce a false sub-secret secret to deceive the generator, which is not feasible. The program does not require re-constructing polynomial when it implements the dynamic threshold secret sharing, and its computation overhead is even smaller.

Key words: dynamic secret sharing, multi-secret sharing, ElGamal cryptosystem, security

中图分类号: