期刊文献+

先验式秘密共享方案及实现 被引量:1

Scheme and Realization of Prior Secret-Share
在线阅读 下载PDF
导出
摘要 分析了传统的秘密共享算法的不足之处,提出了相应的优化方案,形成了先验式秘密共享方案,包括初始化、份额更新、份额恢复和秘密重构,实现了先验式秘密共享协议的各种算法,充分考虑了秘密分享的各个阶段可能遇到的问题,并分别给出了相应的解决方案。 The article first analyses the shortcomings of traditional secret-share algorithm, presents a corresponding optimization scheme, forms prior share-secret scheme, including initialization of share、renewal of share、recovery of share and reconstruction of secret with verification. The paper realizes all algorithms of prior secret-share protocol, and considers possible problems in each phase of secret-share and presents corresponding settlement scheme.
机构地区 防空兵指挥学院
出处 《情报指挥控制系统与仿真技术》 2005年第3期57-60,66,共5页 Information Command Control System and Simulation Technology
关键词 先验式秘密共享 可验证秘密共享 算法 prior secret-share verifiable secret sharing (VSS) algorithm
  • 相关文献

参考文献4

  • 1[1]Eric Rescorla. SSL and TLS Designing and Building Secure Systems. Published By Addsion Wesley Longman,Inc. 2001.
  • 2[2]Cachin.MAFTIA:Specification of Dependable Trusted Third Parties. IBM Research, Zurich Research Laboratory,2001.
  • 3[3]C. Cachin J. A. Poritz. Secure Intrusion-tolerant Replication on the Internet. In Proc. of the 2002 International Conference on Dependable Systems & Networks, Washington, D.C.,2002.
  • 4胡冠章.应用近世代数[M].北京:清华大学出版社,1995.

共引文献1

同被引文献7

  • 1Shamir A.How to Share a Secret[J].Communications of the ACM,1979,22(11):612 -613.
  • 2Pedersen T P.Distributed provers with applications to undeniable signatures[C]//In:Proc.Eurocrypt'91.Lecture Notes in Computer Science 547.New York:Springer-Verlag,1991:221-238.
  • 3Hankerson D,Menezes A,Vanstone S.椭圆曲线密码学导论[M].张焕国,等译.北京:电子工业出版社,2005.
  • 4Nikov V,Nikova S.On Proactive Secret Sharing Schemes[J].Lecture Notes in Computer Science,2004,3357:308-311.
  • 5Asaeda H,Rahman M,Toyama Y.Structuring Proactive Secret Sharing in Mobile Ad-hoc Networks[C] // International Symposium on Wireless Pervasive Computing (ISWPC),IEEE.Phuket,Thailand:[s.n.],2006:1-6.
  • 6Jiejun K,Petros Z,Luo Haiyun,et al.Providing robust and ubiquitous security support for mobile ad-hoc networks[C] //IEEE Ninth International Conference on Network Protocols.Riverside,USA:[s.n.],2001:251-260.
  • 7郭渊博,马建峰.异步及不可靠链路环境下的先应式秘密共享[J].电子学报,2004,32(3):399-403. 被引量:7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部