首页 | 官方网站   微博 | 高级检索  
     

一种具有身份锁的门限多秘密共享方案
引用本文:崔晨雨,张丽娜.一种具有身份锁的门限多秘密共享方案[J].计算机工程与科学,2022,44(8):1382-1391.
作者姓名:崔晨雨  张丽娜
作者单位:(1.西安科技大学计算机科学与技术学院,陕西 西安 710600;2.陕西师范大学计算机科学学院,陕西 西安 710119)
基金项目:国家自然科学基金(62102309);陕西省科技厅青年项目(2021JQ-575,2021JQ-576);陕西省教育厅项目(19JK0526);榆林市科技局项目(2016-24-4,2019-173)
摘    要:为了避免现有秘密共享方案中不同秘密的访问控制结构可能相同的问题,提出一种基于身份锁的门限多秘密共享方案,身份锁决定秘密的授权子集,只有授权子集中的用户可以恢复秘密,对不同的秘密存在不同的身份锁。在保持子秘密可重复使用及可检测欺骗行为的前提下,不增加任何参与者的信息交互,有效地解决了不同秘密的访问控制结构难以更改的问题。同时,基于会话密钥协商算法,该方案不需要预设系统存在安全通道来传输秘密份额,因此具有较好的安全性和实用性。该方案非常适用于视频会议、文件分发等基于身份权限访问控制的门限多秘密共享场景。

关 键 词:访问控制  身份锁  欺骗检测  密钥协商  多秘密共享  
收稿时间:2021-10-09
修稿时间:2021-11-22

A threshold multi-secret sharingscheme with identity lock
CUI Chen-yu,ZHANG Li-na.A threshold multi-secret sharingscheme with identity lock[J].Computer Engineering & Science,2022,44(8):1382-1391.
Authors:CUI Chen-yu  ZHANG Li-na
Affiliation:(1.College of Computer Science and Technology,Xi’an University of Science and Technology,Xi’an 710600; 2.College of Computer Science,Shaanxi Normal University,Xi’an 710119,China)
Abstract:In order to avoid the disadvantage that different secrets has the same access control structure in the existing secret sharing schemes, a threshold multi-secret sharing scheme based on identity lock is proposed, which determines the authorized subset of the secret. Only the user in the authorized subset can recover the secret. There are different identity locks for different secrets.H3: preset that the system has a secure channel to transmit secret shares,Under the premise of keeping the sub-secrets reusable and detectable for deception, it does not increase the information interaction of any participants, and effectively solves the problem that the access control structure of different secrets is difficult to change. At the same time, based on the session key negotiation algorithm, the scheme does not need to use a secure channel to transmit the secret share in advance, so it has better security and practicability. The scheme is suitable for the scenarios of multi-secret threshold sharing based on identity access control, such as video conference and file distribution.
Keywords:access control  identity lock  deception detection  key negotiation  multi-secret sharing     
点击此处可从《计算机工程与科学》浏览原始摘要信息
点击此处可从《计算机工程与科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号