Advanced Search
Volume 25 Issue 11
Nov.  2003
Turn off MathJax
Article Contents
Liu Yuan, Yin Qing, Zhang Limin . A verifiable dynamic secret sharing scheme[J]. Journal of Electronics & Information Technology, 2003, 25(11): 1578-1580.
Citation: Liu Yuan, Yin Qing, Zhang Limin . A verifiable dynamic secret sharing scheme[J]. Journal of Electronics & Information Technology, 2003, 25(11): 1578-1580.

A verifiable dynamic secret sharing scheme

  • Received Date: 2002-06-10
  • Rev Recd Date: 2002-12-25
  • Publish Date: 2003-11-19
  • In the paper, an improved secret sharing scheme based on elliptic curve cryptography is proposed. It guarantees the mutual identity authentication between the legal dealer and the participating parties and can protect against the cheating action. The problems of renew and reuse are properly treated. The scheme may be applicable in practical network communication.
  • loading
  • A. Shamir , How to share a secret, Communications of the ACM, 1979, 22(11), 612-613.[2]G.R. Blakley, Safeguarding cryptographic keys, In Proc. of the AFIPS 1979 National Computer Conference, New York, June 1979, vol.48, 313-317.[3]Wakaha Ogate.[J].Karu Kurosawa, Optimum secret sharing scheme secure against cheating, EUROCRYPT96 Proceedings, Berlin Heidelberg, Springer-Verlag.1996,:-Markus Stadler.[J].Publicly verifiable secret sharing, EURO-CRYPT96 Proceedings, Berlin Heidelberg, Springer-Verlag.1996,:-[4]张建中,谢淑翠,一个新的可防止欺诈的动态秘密共享方案,密码学进展,CHINACRYPT2000,北京,科学出版社,2000,108-111.[5]卢建朱,陈火炎,具有(t,n)共享验证的认证加密方案及其安全性,计算机研究与发展,2001,38(9),1042-1054.[6]冯登国,裴定一,密码学导引,北京,科学出版社,1999,166-167.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2046) PDF downloads(579) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return