Wang Yongchuan, Li Zichen, Yang Yixian. A SECRET KEY DISTRIBUTIONS SCHEME BASED ON THE THEORY OF ALGEBRAIC SEMIGROUPS[J]. Journal of Electronics & Information Technology, 2000, 22(3): 509-512.
Citation:
Wang Yongchuan, Li Zichen, Yang Yixian. A SECRET KEY DISTRIBUTIONS SCHEME BASED ON THE THEORY OF ALGEBRAIC SEMIGROUPS[J]. Journal of Electronics & Information Technology, 2000, 22(3): 509-512.
Wang Yongchuan, Li Zichen, Yang Yixian. A SECRET KEY DISTRIBUTIONS SCHEME BASED ON THE THEORY OF ALGEBRAIC SEMIGROUPS[J]. Journal of Electronics & Information Technology, 2000, 22(3): 509-512.
Citation:
Wang Yongchuan, Li Zichen, Yang Yixian. A SECRET KEY DISTRIBUTIONS SCHEME BASED ON THE THEORY OF ALGEBRAIC SEMIGROUPS[J]. Journal of Electronics & Information Technology, 2000, 22(3): 509-512.
How to distribute a secret key information to n authorized departments(denoted as: S1, S2Sn, respectively).For every autherized department Si(#em/em#=1, 2,, n), there are qi authorized persons,and every authorized person has the same secret key information as that of any other authorized persons in the same authoried department.The secret key information can be reconstrueted Completely from the secret key information of any k authorized persons, if there is at least one authorized person included for every authorized department.But other cases,the secret key information cannot be reconstructed completely.In this paper,based on the algebraic semigroup theory,a secret key sharing scheme is proposed,which can satisfy the demand.
Blakley G R.Safeguarding cryptographic keys,In proceedings of the AFIPS 1979 national com puter conference,Arlington:1979,313-317.[2]Shamir A.How to share a secret,Communications of the ACM.1979,22(1):612-613.[3]Simmous G J.How to(really)share a secret,Proc.Of crypto88,LNCS403,Springer-verlag,[4]Howie J M.An introduction to seimgroup theory,Academic Press,Inc.,New York:1976,89-124.[5]Stinson D.R.Cryptography:Theory and practice,New York:CRC Press,Inc.,1995.259-281, 327-359.