Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2008, Vol. 34 ›› Issue (24): 160-161. doi: 10.3969/j.issn.1000-3428.2008.24.055

• Security Technology • Previous Articles     Next Articles

Verifiable Multi-secret Sharing Scheme

LI Xiong, LI Zhi-hui, YU Jing   

  1. (College of Mathematics and Information Science, Shaanxi Normal University, Xi’an 710062)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-12-20 Published:2008-12-20

一种可验证的多秘密共享方案

李 雄,李志慧,于 静   

  1. (陕西师范大学数学与信息科学学院,西安 710062)

Abstract: YCH scheme is an efficient multi-secret sharing scheme based on two-variable one-way function and Shamir(t, n) threshold secret sharing scheme, but the scheme does not have the property of verification. This paper presents a verifiable multi-secret sharing scheme based on YCH scheme, RSA cryptosystem and intractability of discrete logarithm. It has the property of verification as well as the other properties of YCH scheme. It does not need a secure channel and each participant chooses his secret shadow by himself, so the scheme provides great capabilities for many applications.

Key words: multi-secret sharing, RSA cryptosystem, discrete logarithm, verification

摘要: YCH方案是一个基于二元单向函数和Shamir(t,n)门限方案的有效多秘密共享方案,但其不具有可验证性。该文基于YCH方案、RSA密码体制和离散对数问题,提出一个可验证的多秘密共享方案,使YCH方案保留原有性质的同时实现了可验证性。该方案中参与者的秘密份额由自己选择产生且无需安全信道,有较强的实用价值。

关键词: 多秘密共享, RSA密码体制, 离散对数, 可验证性

CLC Number: