浏览全部资源
扫码关注微信
1. 北京电子科技学院密码科学与技术,北京 100070
2. 公安部第三研究所,上海 201204
3. 中思博安科技(北京)有限公司科学研究院,北京 100195
[ "张艳硕(1979-),男,陕西宝鸡人,博士,北京电子科技学院讲师,主要研究方向为密码理论及其应用。" ]
[ "李文敬(1992-),女,山东济宁人,北京电子科技学院硕士生,主要研究方向为信息安全。" ]
[ "陈雷(1992-),男,河北邯郸人,北京电子科技学院硕士生,主要研究方向为信息安全。" ]
[ "毕伟(1980-),男,黑龙江哈尔滨人,博士,中思博安科技(北京)有限公司研究员,主要研究方向为信息安全和区块链技术。" ]
[ "杨涛(1977-),男,安徽芜湖人,博士,公安部第三研究所副研究员,主要研究方向为信息安全。" ]
网络出版日期:2018-08,
纸质出版日期:2018-08-25
移动端阅览
张艳硕, 李文敬, 陈雷, 等. 基于特征值的可验证特殊门限秘密共享方案[J]. 通信学报, 2018,39(8):169-175.
Yanshuo ZHANG, Wenjing LI, Lei CHEN, et al. Verifiable special threshold secret sharing scheme based on eigenvalue[J]. Journal on communications, 2018, 39(8): 169-175.
张艳硕, 李文敬, 陈雷, 等. 基于特征值的可验证特殊门限秘密共享方案[J]. 通信学报, 2018,39(8):169-175. DOI: 10.11959/j.issn.1000-436x.2018143.
Yanshuo ZHANG, Wenjing LI, Lei CHEN, et al. Verifiable special threshold secret sharing scheme based on eigenvalue[J]. Journal on communications, 2018, 39(8): 169-175. DOI: 10.11959/j.issn.1000-436x.2018143.
利用 n阶矩阵的特征方程具有重根的特点,密钥分发者给每一个参与者分发 2种不同的子密钥,这2种子密钥满足线性无关和对应的特征值相等的特性。在子密钥分发和主密钥恢复的过程中,黑盒子通过子密钥的特性来判断参与者活动的真实性,若这2种子密钥满足线性无关和特征值相等这2个条件,则说明参与者活动是诚实的,否则,可以判定其存在欺诈行为。分析结果表明,该方案是正确的、安全的,且信息率为12。
Utilizing the characteristic that the characteristic equation of the n-th order matrix have multiple roots
the secret distributor distributes two different sub-keys to each participant
and these two sub-keys satisfy two conditions:linear independent and equality of the corresponding characteristic values.In the process of sub-key distribution and master key recovery
the black box can judge the authenticity of the participants’ activities through the characteristics of the sub-keys.If the two sub-keys have satisfied two conditions of linear independence and equal feature values
it can be determined that the participant’s activity is honest
otherwise
it can be determined that there exists fraudulent activity.The analysis results show that the scheme is correct
secure
and the information rate is 12.
SHAMIR A . How to share a secret [J ] . Communication ACM , 1979 , 22 ( 11 ): 612 - 613 .
BLAKLEY G R , . Safeguarding cryptographic keys [C ] // IEEE Computer Society . 1979 :313.
ASMUTH C , BLOOM J . A modular approach to key safeguarding [J ] . IEEE Transactions on Information Theory , 1983 , 29 ( 2 ): 208 - 210 .
KARNIN E D , GREENE J , HELLMAN M E . On secret sharing systems [J ] . IEEE Transactions on Information Theory , 1983 , 29 ( 1 ): 35 - 41 .
CHOR B , GOLDWASSER S , MICALI S , et al . Verifiable secret sharing and achieving simultaneity in the presence of faults [C ] // Symposium on Foundations of Computer Science . 2008 : 383 - 395 .
LIU C J , LI Z H , BAI C M , et al . Quantum-secret-sharing scheme based on local distinguishability of orthogonal seven-qudit entangled states [J ] . International Journal of Theoretical Physics , 2018 , 57 ( 3 ): 1 - 15 .
XU T T , LI Z H , BAI C M , et al . A new improving quantum secret sharing scheme [J ] . International Journal of Theoretical Physics , 2017 , 56 : 1 - 10 .
SINGH N , TENTU A N , BASIT A , et al . Sequential secret sharing scheme based on Chinese remainder theorem [C ] // IEEE International Conference on Computational Intelligence and Computing Research . 2017 : 1 - 6 .
SONG Y , LI Y , WANG W . Multiparty quantum direct secret sharing of classical information with bell states and bell measurements [J ] . International Journal of Theoretical Physics , 2018 , 57 ( 5 ): 1559 - 1571 .
PILARAM H , EGHLIDOS T , PILARAM H , et al . A lattice-based changeable threshold multi-secret sharing scheme and its application to threshold cryptography [J ] . Scientia Iranica , 2017 , 24 ( 3 ): 1448 - 1457 .
BASIT A , KUMAR N C , VENKAIAH V C , et al . Multi-stage multi-secret sharing scheme for hierarchical access structure [C ] // International Conference on Computing,Communication and Automation . 2017 : 556 - 563 .
ZHANG T , KE X , LIU Y . (t,n) multi-secret sharing scheme extended from Harn-Hsu’s scheme [J ] . Eurasip Journal on Wireless Communications & Networking , 2018 , 2018 ( 1 ): 7 - 1 .
YUAN D , HE M , ZENG S , et al . (t,p)-threshold point function secret sharing scheme based on polynomial interpolation and its application [C ] // IEEE/ACM International Conference on Utility and Cloud Computing . 2017 : 269 - 275 .
李滨 . 基于特殊访问权限的差分秘密共享方案 [J ] . 四川大学学报(自然科学版) , 2006 ( 1 ): 78 - 83 .
LI B . Differential secret sharing scheme based on special accesspermissions [J ] . Journal of Sichuan University (Natural Science Edition) , 2006 ( 1 ): 78 - 83 .
同济大学数学系编 . 工程数学线性代数 [M ] . 北京 : 高等教育出版社 , 2014 .
School of Mathematic Sciences,Tongji University . Engineering mathematics,linear algebra [M ] . Beijing:Higher Education Press . 2014 .
曹尔强 , 张沂 , 曹晔 , 等 . “软件黑盒子”文件加锁和加密的一个方法 [J ] . 长春邮电学院学报 , 1991 ( 3 ): 11 - 14 .
CAO E Q , ZHANG Y , CAO Y , et al . A technique of locking a disk and secreting a whole disk [J ] . Journal of Changchun Post & Telecommunication Institute , 1991 ( 3 ): 11 - 14 .
0
浏览量
1023
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构