Advanced Search
Volume 26 Issue 8
Aug.  2004
Turn off MathJax
Article Contents
Zhang Fu-tai, Shi Jun, Wang Yu-min. Information-Theoretical Secure Verifiable Secret Sharing on Vector Space Access Structures[J]. Journal of Electronics & Information Technology, 2004, 26(8): 1288-1293.
Citation: Zhang Fu-tai, Shi Jun, Wang Yu-min. Information-Theoretical Secure Verifiable Secret Sharing on Vector Space Access Structures[J]. Journal of Electronics & Information Technology, 2004, 26(8): 1288-1293.

Information-Theoretical Secure Verifiable Secret Sharing on Vector Space Access Structures

  • Received Date: 2003-05-11
  • Rev Recd Date: 2003-09-07
  • Publish Date: 2004-08-19
  • Verifiable secret sharing widely applies in the areas such as safeguarding and legal use of confidential information, key escrow, group oriented cryptography, secured mul-tiparty computation, access control and electronic commerce. In this paper, the problem of verifiable secret sharing on vector space access structures is studied. An information-theoretical secure verifiable secret sharing protocol on this kind of access structures is pro-posed. Compared with generalized verifiable secret sharing protocols available, the newly proposed protocol has not only a higher information rate, but also a far lower cost of com-putation and communication.
  • loading
  • Shamir A.How to share a secret.Communications of the ACM,1979,24(11):612-613.[2]Brickell E F.Some ideal secret sharing schemes.Journal of Combinatorial Mathematics and Combinatorial Computing,1989,9(6):105-113.[3]Padro C,Saez G,Villar J L.Detection of cheaters in vector space secret sharing schemes[J].Designs,Codes and cryptography.1999,16(3):75-85[4]Chor B,Goldwasser S,Micali S,Awerbuch B.Verifiable secret sharing and achieving simultaneity in the presence of faults.Proceedings of 26th IEEE Symposium on Foundations of Computer Science,Portland,1985:383-395.[5]Pedersen P.Non-interactive and information-theoretic secure verifiable secret sharing.CRYPTO91,Berlin,1991:129-139.[6]Gennaro R.Theory and practice of verifiable secret sharing.[Ph.D.Thesis],MIT,1996:51-107.[7]张福泰,张方国,王育民.一个基于秘密分享和签密的高效多轮电子拍卖方案[J].电子与信息学报.2001,23(12):1377-1383浏览[8]张福泰,郭西强,王育民.向量空间接入结构上的高效可验证秘密分享.计算机工程与应用,2002,38(3):60-62.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2480) PDF downloads(588) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return