首页 | 官方网站   微博 | 高级检索  
     

AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME
作者姓名:Pang  Liaojun  Sun  Xi  Wang  Yumin
作者单位:The National Key Lab of Integrated Service Networks, Xidian Univ., Xi 'an 710071, China
基金项目:Supported by the 973 Project of China (G19990358-04)
摘    要:Based on Shamir's threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sharing scheme is proposed in this paper. In this scheme, each participant's secret shadow is selected by the participant himself, and even the secret dealer cannot gain anything about his secret shadow. All the shadows are as short as the shared secret. Each participant can share many secrets with other participants by holding only one shadow. Without extra equations and information designed for verification, each participant is able to check whether another participant provides the true information or not in the recovery phase. Unlike most of the existing schemes, it is unnecessary to maintain a secure channel between each participant and the dealer. Therefore, this scheme is very attractive, especially under the circumstances that there is no secure channel between the dealer and each participant at all. The security of this scheme is based on that of Shamir's threshold scheme and the difficulty in solving the discrete logarithm problem. Analyses show that this scheme is a computationally secure and efficient scheme.

关 键 词:机密分享  阈值安排  离散对数  计算机技术
收稿时间:2004-12-27
修稿时间:2005-06-10

An efficient and secure (t, n) threshold secret sharing scheme
Pang Liaojun Sun Xi Wang Yumin.An efficient and secure (t, n) threshold secret sharing scheme[J].Journal of Electronics,2006,23(5):731-735.
Authors:Liaojun Pang  Xi Sun  Yumin Wang
Affiliation:1. The National Key Lab of Integrated Service Networks, Xidian Univ., Xi’an, 710071, China
Abstract:Based on Shamir's threshold secret sharing scheme and the discrete logarithm problem, a new (t,n)threshold secret sharing scheme is proposed in this paper. In this scheme, each participant's secret shadow is selected by the participant himself, and even the secret dealer cannot gain anything about his secret shadow.All the shadows are as short as the shared secret. Each participant can share many secrets with other participants by holding only one shadow. Without extra equations and information designed for verification, each participant is able to check whether another participant provides the true information or not in the recovery phase. Unlike most of the existing schemes, it is unnecessary to maintain a secure channel between each participant and the dealer. Therefore, this scheme is very attractive, especially under the circumstances that there is no secure channel between the dealer and each participant at all. The security of this scheme is based on that of Shamir's threshold scheme and the difficulty in solving the discrete logarithm problem. Analyses show that this scheme is a computationally secure and efficient scheme.
Keywords:Secret sharing  Threshold scheme  Discrete logarithm
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
点击此处可从《电子科学学刊(英文版)》浏览原始摘要信息
点击此处可从《电子科学学刊(英文版)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号