AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME

来源 :Journal of Electronics | 被引量 : 0次 | 上传用户:asdhjy
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Based on Shamir’s threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sharing scheme is proposed in this paper. In this scheme, each participant’s secret shadow is selected by the participant himself, and even the secret dealer cannot gain anything about his secret shadow. All the shadows are as short as the shared secret. Each participant can share many secrets with other partici- pants by holding only one shadow. Without extra equations and information designed for verification, each participant is able to check whether another participant provides the true information or not in the recovery phase. Unlike most of the existing schemes, it is unnecessary to maintain a secure channel between each par- ticipant and the dealer. Therefore, this scheme is very attractive, especially under the circumstances that there is no secure channel between the dealer and each participant at all. The security of this scheme is based on that of Shamir’s threshold scheme and the difficulty in solving the discrete logarithm problem. Analyses show that this scheme is a computationally secure and efficient scheme. Based on Shamir’s threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sharing scheme is proposed in this paper. In this scheme, each participant’s secret shadow is selected by the participant himself, and even the secret dealer can not gain anything about his secret shadow. All the shadows are as short as the shared secret. Each participant can share many secrets with other partici- pants by holding only one shadow. Without extra equations and information designed for verification, each participant is able to check whether another participant provides the true information or not in the recovery phase. Unlike most of the existing schemes, it is unnecessary to maintain a secure channel between each par- ticipant and the dealer. Therefore, this scheme is very attractive, especially under the circumstances that there is no secure channel between the dealer and each participant at all. The security of this scheme is based on that of Shamir ’ s threshold scheme and the difficulty in solving the discrete logarithm problem. Analyzes show that this scheme is a computationally secure and efficient scheme.
其他文献
会议
目的 总结10年高能量创伤濒临截肢肢体的保肢手术经验,探讨其显微修复治疗方法 及预后.方法 回顾性分析2010年5月—2020年1月35例高能量四肢严重损伤患者的临床资料.根据毁损
目的 探讨女性不孕不育症患者采用新型子宫输卵管造影术治疗的临床疗效.方法 回顾性分析2017年12月-2019年12月该院收治的66例女性不孕不育症患者的临床诊治情况,其中33例采
为了证实单纯性肥胖对儿童智力发育有无影响,我们于1989年3月对南京市18所小学中部分肥胖儿的智力和学习成绩进行了调查分析。1.对象和方法:肥胖度超过20%者为病例。对照选
目的 调查妊娠早期妇女的婚姻适应状况并分析其影响因素,为提高妊娠早期妇女的婚姻质量和减少不良心理问题的发生提供依据.方法 采用婚姻适应量表、简易应对方式量表和家庭关
会议
目前,对非吸烟妇女肺癌的患病原因尚未完全明确。为评价被动吸烟与非吸烟妇女肺癌的联系,作者进行了此项研究。研究对象为美国密苏里州白人妇女,病例组为618例1988年1月~1991
目的 分析妊娠期和哺乳期乳腺癌患者血清糖链抗原153(CA153)、人表皮生长因子受体4(HER4)表达及与预后的相关性.方法 选取2009年3月-2018年3月杭州市余杭区妇幼保健院收治的
会议
在农村领域,产业化作为主导的思路,一直没有变化,已滞后于现代化的整体形势。在这种情况下,探索适应时代、跟上时代的新路,特别是探索新的带动力量,具有特别重大的现实意义。