向量空间接入结构上信息论安全的可验证秘密分享
Information-Theoretical Secure Verifiable Secret Sharing on Vector Space Access Structures
-
摘要: 可验证秘密分享在诸如对机密信息的安全保存与合法利用、密钥托管、面向群体的密码学、多 方安全计算、接入控制及电子商务等许多方面都有着广泛的应用。该文对向量空间接入结构上的可验证秘密分享进行了研究。提出了这类接入结构上的一个信息论安全的高效可验证秘密分享协议。新提出的协议不仅具有较高的信息速率,而且计算和通信代价都远远的低于已有的广义可验证秘密分享协议。Abstract: Verifiable secret sharing widely applies in the areas such as safeguarding and legal use of confidential information, key escrow, group oriented cryptography, secured mul-tiparty computation, access control and electronic commerce. In this paper, the problem of verifiable secret sharing on vector space access structures is studied. An information-theoretical secure verifiable secret sharing protocol on this kind of access structures is pro-posed. Compared with generalized verifiable secret sharing protocols available, the newly proposed protocol has not only a higher information rate, but also a far lower cost of com-putation and communication.
-
Shamir A.How to share a secret.Communications of the ACM,1979,24(11):612-613.[2]Brickell E F.Some ideal secret sharing schemes.Journal of Combinatorial Mathematics and Combinatorial Computing,1989,9(6):105-113.[3]Padro C,Saez G,Villar J L.Detection of cheaters in vector space secret sharing schemes[J].Designs,Codes and cryptography.1999,16(3):75-85[4]Chor B,Goldwasser S,Micali S,Awerbuch B.Verifiable secret sharing and achieving simultaneity in the presence of faults.Proceedings of 26th IEEE Symposium on Foundations of Computer Science,Portland,1985:383-395.[5]Pedersen P.Non-interactive and information-theoretic secure verifiable secret sharing.CRYPTO91,Berlin,1991:129-139.[6]Gennaro R.Theory and practice of verifiable secret sharing.[Ph.D.Thesis],MIT,1996:51-107.[7]张福泰,张方国,王育民.一个基于秘密分享和签密的高效多轮电子拍卖方案[J].电子与信息学报.2001,23(12):1377-1383浏览[8]张福泰,郭西强,王育民.向量空间接入结构上的高效可验证秘密分享.计算机工程与应用,2002,38(3):60-62.
计量
- 文章访问数: 2499
- HTML全文浏览量: 103
- PDF下载量: 588
- 被引次数: 0