作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2008, Vol. 34 ›› Issue (15): 164-165. doi: 10.3969/j.issn.1000-3428.2008.15.059

• 安全技术 • 上一篇    下一篇

动态门限多重秘密共享方案

庞辽军1,李慧贤2,王育民1   

  1. (1. 西安电子科技大学计算机网络与信息安全教育部重点实验室,西安 710071;2. 西北工业大学计算机学院,西安 710072)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2008-08-05 发布日期:2008-08-05

Dynamic Threshold Multi-secret Sharing Scheme

PANG Liao-jun1, LI Hui-xian2, WANG Yu-min1   

  1. (1. Ministry of Education Key Lab of Computer Network and Information Security, Xidian University, Xi’an 710071; 2. School of Computer Science, Northwestern Polytechnical University, Xi’an 710072)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-08-05 Published:2008-08-05

摘要: 提出一个动态的门限秘密共享方案。参与者的秘密份额由各参与者自己选择,秘密分发者无须向各参与者传送任何秘密信息,因此,他们之间不需要安全信道。当秘密更新、参与者加入或退出系统时,各参与者的份额无须更新。秘密份额的长度小于或等于秘密的长度。每个参与者只须维护一个秘密份额,就可以实现对多个秘密的共享。在秘密恢复过程中,每个参与者能够验证其他参与者是否进行了欺骗。该方案以Shamir的门限方案和RSA密码体制的安全性为基础,是一个安全、高效的方案。

关键词: 秘密共享, 门限方案, 安全性

Abstract: This paper proposes a dynamic threshold secret sharing scheme. Each participant’s secret shadow is selected by the participant himself and the dealer need not deliver any secret information to each participant, so a secure channel between them is unnecessary. The shadows do not need to be changed when the shared secret is renewed, old participants are deleted or new participants are added. All these shadows are shorter than or as short as the shared secret. Each participant can share many secrets with other participants by holding only one shadow, and in the recovery phase, each participant is allowed to check whether another participant provides the true information. The scheme is based on the security of Shamir’s threshold scheme and the RSA cryptosystem. It is a computationally secure and efficient scheme.

Key words: secret sharing, threshold scheme, security

中图分类号: