Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering

Previous Articles     Next Articles

Lattice-based Threshold Secret Sharing Algorithm

ZHANG Hongjun 1,3,LIU Ke 2,MOU Zhansheng 1   

  1. (1.College of Computer and Information Engineering,Henan Normal University,Xinxiang,Henan 453003,China; 2.Network Information Management Center,Huanghuai University,Zhumadian,Henan 463000,China; 3.College of Humanistic Management,Anyang Normal University,Anyang,Henan 455003,China)
  • Received:2015-10-21 Online:2016-06-15 Published:2016-06-15

基于格的门限秘密共享算法

张红军1,3,刘珂2,牟占生1   

  1. (1.河南师范大学 计算机与信息工程学院,河南 新乡 453003; 2.黄淮学院 网络信息管理中心,河南 驻马店 463000; 3.安阳师范学院 人文管理学院,河南 安阳 455003)
  • 作者简介:张红军(1979-),男,讲师、硕士,主研方向为网络安全、多媒体技术;刘珂,讲师、硕士;牟占生,副教授、硕士。
  • 基金资助:
    河南省高等学校重点科研计划基金资助项目(15B520002);河南省教师教育课程改革研究基金资助项目(2014-JSJYYB-154);河南省教育厅人文社会科学研究基金资助项目(2014-zc-055)。

Abstract: The secret sharing algorithm based on the traditional mathematical assumption is difficult to resist the attack of the quantum algorithm.Therefore,a lattice-based threshold secret sharing algorithm is proposed.The basic process of the secret sharing strategy is analyzed,which is divided into public key generation,share generation and secret reconstruction.The threshold secret sharing algorithm based on lattice is discussed.The algorithm can be reduced to the closest vector problem,and its security is analyzed.Calculation results prove that the algorithm is correct and safe.

Key words: lattice, closest vector problem, threshold, secret sharing, distributed encryption system

摘要: 基于传统数学假设的秘密共享算法难以有效抵御量子算法的攻击。为此,提出一种基于格的门限秘密共享算法。分析秘密共享基本步骤,包括公钥生成、份额生成以及秘密重构。论述基于格的门限秘密共享算法,该算法可被规约为格上的最近向量问题,并对其安全性进行分析。推算结果证明了该算法具有正确性和安全性。

关键词: 格, 最近向量问题, 门限, 秘密共享, 分布式加密系统

CLC Number: