Advanced Search
Volume 26 Issue 6
Jun.  2004
Turn off MathJax
Article Contents
He Ye-feng, Zhang Jian-zhong. A Dynamic Secret Sharing Scheme Based on Factorization and Discrete Logarithms[J]. Journal of Electronics & Information Technology, 2004, 26(6): 1005-1008.
Citation: He Ye-feng, Zhang Jian-zhong. A Dynamic Secret Sharing Scheme Based on Factorization and Discrete Logarithms[J]. Journal of Electronics & Information Technology, 2004, 26(6): 1005-1008.

A Dynamic Secret Sharing Scheme Based on Factorization and Discrete Logarithms

  • Received Date: 2003-01-09
  • Rev Recd Date: 2003-09-08
  • Publish Date: 2004-06-19
  • A dynamic secret sharing scheme based on discrete logarithms and factorization is proposed in this paper. It has the following advanced properties: (1) The dealer can renew system secrets without renewing the shadows of the participants; (2) When the system accepts a new participant or fires a participant, the shadows of other participants would not change; (3) When some participants shadows are revealed ,they can be renewed without any effect on the others; (4) It can detect the cheater; (5) Comunication is reduced and work efficiency is improved.
  • loading
  • Shamir A.How to share a secret[J].Communications of the ACM.1979,22(11):612-613[2]Blackley G R.Safeguarding cryptographic keys.In:Proceedings of the National Computer Conference of AFIPS,Montvale,1979,48:313-317.[3]Fouque P A,Poupard G,Sten J.Sharing decryption in the context of voting or lotteries.Proceedings of Financial Cryptography 2000.Berlin:Springer-Verlag,2000:90-104.[4]Brickell E F,Daveport D M.On the classification of idea secret sharing scheme.J.Cryptology,1991,4(2):123-134.[5]Tompa M,Woll H.How to share a secret with cheaters[J].J.Cryptology.1988,1(2):133-138[6]Chor B,Goldwasser S,Awerbuch B.Verifiable secret sharing and achieving simultaneity in the presence of faults.Proceedings of the 26th Annual IEEE Symposium on the Foundations of Computer Science,1985:383-395.[7]Stadler M.Publicly verifiable secret sharing.Advances in Cryptology-Eurocrypt96,Berlin:Springer-Verlag,1996:190-199.[8]Gennaro R,Micali S.Verifiable secret sharing as secure computation.Advances in CryptologyCrypto94.Berlin:Springer-Verlag,1995:168-182.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2093) PDF downloads(723) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return