Verifiable special threshold secret sharing scheme based on eigenvalue
Papers|更新时间:2024-06-05
|
Verifiable special threshold secret sharing scheme based on eigenvalue
Journal on CommunicationsVol. 39, Issue 8, Pages: 169-175(2018)
作者机构:
1. 北京电子科技学院密码科学与技术,北京 100070
2. 公安部第三研究所,上海 201204
3. 中思博安科技(北京)有限公司科学研究院,北京 100195
作者简介:
基金信息:
The Opening Project of Key Lab of Information Network Security of Ministry of Public Security(C17608);The Information Technology Research Base of Civil Aviation Administration of China(CAAC-ITRB-201705);The National Natural Science Foundation of China(61772047)
Yanshuo ZHANG, Wenjing LI, Lei CHEN, et al. Verifiable special threshold secret sharing scheme based on eigenvalue[J]. Journal on Communications, 2018, 39(8): 169-175.
DOI:
Yanshuo ZHANG, Wenjing LI, Lei CHEN, et al. Verifiable special threshold secret sharing scheme based on eigenvalue[J]. Journal on Communications, 2018, 39(8): 169-175. DOI: 10.11959/j.issn.1000-436x.2018143.
Verifiable special threshold secret sharing scheme based on eigenvalue
Utilizing the characteristic that the characteristic equation of the n-th order matrix have multiple roots
the secret distributor distributes two different sub-keys to each participant
and these two sub-keys satisfy two conditions:linear independent and equality of the corresponding characteristic values.In the process of sub-key distribution and master key recovery
the black box can judge the authenticity of the participants’ activities through the characteristics of the sub-keys.If the two sub-keys have satisfied two conditions of linear independence and equal feature values
it can be determined that the participant’s activity is honest
otherwise
it can be determined that there exists fraudulent activity.The analysis results show that the scheme is correct
secure
and the information rate is 12.
关键词
Keywords
references
SHAMIR A . How to share a secret [J ] . Communication ACM , 1979 , 22 ( 11 ): 612 - 613 .
BLAKLEY G R , . Safeguarding cryptographic keys [C ] // IEEE Computer Society . 1979 :313.
ASMUTH C , BLOOM J . A modular approach to key safeguarding [J ] . IEEE Transactions on Information Theory , 1983 , 29 ( 2 ): 208 - 210 .
KARNIN E D , GREENE J , HELLMAN M E . On secret sharing systems [J ] . IEEE Transactions on Information Theory , 1983 , 29 ( 1 ): 35 - 41 .
CHOR B , GOLDWASSER S , MICALI S , et al . Verifiable secret sharing and achieving simultaneity in the presence of faults [C ] // Symposium on Foundations of Computer Science . 2008 : 383 - 395 .
LIU C J , LI Z H , BAI C M , et al . Quantum-secret-sharing scheme based on local distinguishability of orthogonal seven-qudit entangled states [J ] . International Journal of Theoretical Physics , 2018 , 57 ( 3 ): 1 - 15 .
XU T T , LI Z H , BAI C M , et al . A new improving quantum secret sharing scheme [J ] . International Journal of Theoretical Physics , 2017 , 56 : 1 - 10 .
SINGH N , TENTU A N , BASIT A , et al . Sequential secret sharing scheme based on Chinese remainder theorem [C ] // IEEE International Conference on Computational Intelligence and Computing Research . 2017 : 1 - 6 .
SONG Y , LI Y , WANG W . Multiparty quantum direct secret sharing of classical information with bell states and bell measurements [J ] . International Journal of Theoretical Physics , 2018 , 57 ( 5 ): 1559 - 1571 .
PILARAM H , EGHLIDOS T , PILARAM H , et al . A lattice-based changeable threshold multi-secret sharing scheme and its application to threshold cryptography [J ] . Scientia Iranica , 2017 , 24 ( 3 ): 1448 - 1457 .
BASIT A , KUMAR N C , VENKAIAH V C , et al . Multi-stage multi-secret sharing scheme for hierarchical access structure [C ] // International Conference on Computing,Communication and Automation . 2017 : 556 - 563 .
ZHANG T , KE X , LIU Y . (t,n) multi-secret sharing scheme extended from Harn-Hsu’s scheme [J ] . Eurasip Journal on Wireless Communications & Networking , 2018 , 2018 ( 1 ): 7 - 1 .
YUAN D , HE M , ZENG S , et al . (t,p)-threshold point function secret sharing scheme based on polynomial interpolation and its application [C ] // IEEE/ACM International Conference on Utility and Cloud Computing . 2017 : 269 - 275 .
LI B . Differential secret sharing scheme based on special accesspermissions [J ] . Journal of Sichuan University (Natural Science Edition) , 2006 ( 1 ): 78 - 83 .
同济大学数学系编 . 工程数学线性代数 [M ] . 北京 : 高等教育出版社 , 2014 .
School of Mathematic Sciences,Tongji University . Engineering mathematics,linear algebra [M ] . Beijing:Higher Education Press . 2014 .
CAO E Q , ZHANG Y , CAO Y , et al . A technique of locking a disk and secreting a whole disk [J ] . Journal of Changchun Post & Telecommunication Institute , 1991 ( 3 ): 11 - 14 .