Practical Secret Sharing Scheme Realizing Generalized Adversary Structure

来源 :计算机科学技术学报 | 被引量 : 0次 | 上传用户:skyy2483
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Most existing secret sharing schemes are constructed to realize general access structure,which is defined in terms of authorized groups of participants,and is unable to be applied directly to the design of intrusion tolerant system,which often concerns corruptible groups of participants instead of authorized ones.Instead,the generalized adversary structure,which specifies the corruptible subsets of participants,can be determined directly by exploit of the system setting and the attributes of all participants.In this paper an efficient secret sharing scheme realizing generalized adversary structure is proposed,and it is proved that the scheme satisfies both properties of the secret sharing scheme,i.e.,the reconstruction property and the perfect property.The main features of this scheme are that it performs modular additions and subtractions only,and each share appears in multiple share sets and is thus replicated.The former is an advantage in terms of computational complexity,and the latter is an advantage when recovery of some corrupted participants is necessary.So our scheme can achieve lower computation cost and higher availability.Some reduction on the scheme is also done finally,based on an equivalence relation defined over adversary structure.Analysis shows that reduced scheme still preserves the properties of the original one.
其他文献
Kinetics of synthesis of methyl formate from carbon monoxide and methanol, using sodium methoxide as the catalyst and pyridine as the promoter in a batch reacto
The temperature dependence of exchange bias and coercivity in a ferromagnetic layer coupled with an antiferromagnetic layer is discussed.In this model,the tempe
A two-dimensional hydrogen-bonded cadmium(II) compound [Cd(dapm)2- (CH3COO)2(H2O)2](dapm=diaminodiphenylmethane)has been synthesized and characterized by single
With the assistance of the symbolic computation system Maple,rich higher order polynomial-type conservation laws and a sixth order t/x-dependent conservation la
The synthesis of Ts, T10 and T12 silsesquioxane cages from a range of starting materials: phenyl-cistetrol, 1,3-divinyltetraethoxydisiloxane and cyclopentyl T r
由Er2O3、H4SiMo12O40和nmp合成了分子组成为[Er(nmp)4(H2O)3]H[SiMo12O40]2nmp0.5H2O(nmp=N-甲基吡咯烷酮)的配合物,并通过单晶X-射线衍射测定了晶体结构。结果表明,该化合
Gas phase selective catalytic oxidation of toluene to benzaldehyde was studied on V2O5-Ag2O/η-Al2O3 catalyst prepared by impregnation. The catalyst was charact
The conversion and utilization of natural gas is of significant meaning to the national economy,even to the everyday life of people. However, it has not become
Creep and stress relaxation behavior, the elastic modulus and fracture toughness of machinable Ti3SiC2 at various temperatures from 20 to 1250℃ were investiga
A numerical simulation method is presented for the random-fuzzy safety analysis of an aero engine disk. Based on the equivalent transformation from a fuzzy vari