Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
|更新时间:2024-10-14
|
Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
Vol. 30, Issue 10, Pages: 118-123(2009)
作者机构:
1. 华中科技大学计算机学院信息安全实验室
2. 武汉市数字工程研究所
作者简介:
基金信息:
DOI:
CLC:TN918.1
Published:2009
稿件说明:
移动端阅览
XU Jing-fang1, CUI Guo-hua1, CHENG Qi2, et al. Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme[J]. 2009, 30(10): 118-123.
DOI:
XU Jing-fang1, CUI Guo-hua1, CHENG Qi2, et al. Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme[J]. 2009, 30(10): 118-123.DOI:
Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
摘要
针对一个秘密共享新个体加入协议
具体地给出了2种攻击
使得不良的广播接收者可以很容易的恢复出t个旧成员的秘密份额si
进而恢复出新个体的秘密份额sn+1和主秘密S
并且证明了导致这2种攻击成功的根本原因。此外
提出了一个新的改进方案
改进方案不仅弥补了原方案的安全缺陷
而且与已有的协议相比需要更少的通信量。
Abstract
Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme was presented
in which a malicious broadcast receiver might easily recover old t shares
new share and further reconstruct the secret S. The claimed security could not be realized. In addition
a new protocol was proposed
which elaborately eliminates the defect of previous protocol and improved the efficiency of existing schemes.