A (t, m, n)-Group Oriented Secret Sharing Scheme

来源 :Chinese Journal of Electronics | 被引量 : 0次 | 上传用户:pww030
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Basic(t, n)-Secret sharing(SS) schemes share a secret among n shareholders by allocating each a share. The secret can be reconstructed only if at least t shares are available. An adversary without a valid share may obtain the secret when more than t shareholders participate in the secret reconstruction. To address this problem, the paper introduces the notion and gives the formal definition of(t, m, n)-Group oriented secret sharing(GOSS); and proposes a(t, m, n)-GOSS scheme based on Chinese remainder theorem. Without any share verification or user authentication, the scheme uses Randomized components(RC) to bind all participants into a tightly coupled group, and ensures that the secret can be recovered only if all m(m ≥ t) participants in the group have valid shares and release valid RCs honestly. Analysis shows that the proposed scheme can guarantee the security of the secret even though up to m-1 RCs or t-1 shares are available for adversaries. Our scheme does not depend on any assumption of hard problems or one way functions. Basic (t, n) -Secret sharing (SS) schemes share a secret among n shareholders by allocating each a share. The secret can be reconstructed only if at least t shares are available. An adversary without a valid share may obtain the secret when To address this problem, the paper introduces the notion and gives the formal definition of (t, m, n) -Group oriented secret sharing (GOSS); and vi a (t, m, Without any share verification or user authentication, the scheme uses Randomized Components (RC) to bind all participants into a tightly coupled group, and ensures that the secret can be recovered only if all m m ≥ t) participants in the group have valid shares and release valid RCs honestly. Analysis shows that the proposed scheme can guarantee the security of the secret even though up to m-1 RCs or t-1 shares are available for adversaries. Our scheme does not depend on any ass umption of hard problems or one way functions.
其他文献
Drop Connect is a recently introduced algorithm to prevent the co-adaptation of feature detectors.Compared to Dropout, Drop Connect gains state-of-the-art results on several image recognition benchmar
Aim to improve the convergence of the adaptive filtering, based on the multi-step gradient method, a new affine pro jection algorithm with direction error is pr
A new method is proposed for joint range and bearing(azimuth and elevation) estimation of multiple near-field acoustic sources using observations collected by a
介绍用超声导波长距离检测在役管道的新技术。此技术在国外已成功地用于石油、化工、电站、煤气等管道腐蚀在不去除包覆层的情况下进行快速检测 ,对及早发现隐患、防范泄漏事
The nonlinearity of S-boxes and their related supercodes of the first order Reed-Muller code are discussed. Based on the properties of multi-output bent functio
期刊
期刊