计算机工程与应用 ›› 2011, Vol. 47 ›› Issue (7): 82-84.

• 网络、通信、安全 • 上一篇    下一篇

攻击结构上的参与者有权重的秘密共享方案

乔晓林,张建中,李 瑞   

  1. 陕西师范大学 数学与信息科学学院,西安 710062
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2011-03-01 发布日期:2011-03-01

Secret sharing scheme among weighted participants based on adversary structure

QIAO Xiaolin,ZHANG Jianzhong,LI Rui   

  1. College of Mathematics and Information Science,Shaanxi Normal University,Xi’an 710062,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2011-03-01 Published:2011-03-01

摘要: 针对实际应用中同时涉及参与者权重和攻击结构两方面的问题,根据中国剩余定理,提出了一个基于攻击结构的秘密共享方案。该方案是一种完善的秘密共享方案,具有秘密重构特性和完善保密性,可以有效地防止外部攻击和内部欺骗。所有信息可以明文形式进行传送,不需要安全信道。方案允许参与者动态地加入或退出,攻击结构和共享秘密也可以动态更新,并且各参与者的秘密份额不需要更新。方案的安全性基于Shamir门限方案和离散对数问题的难解性。

关键词: 信息安全, 秘密共享, 权重不同, 攻击结构

Abstract: Aiming at the problems in practical application involving both weighted participants and adversary structure,based on Chinese remainder theorem,a secret sharing scheme constructed on adversary structure is proposed.The scheme is a prefect secret sharing scheme with reconstruction property and confidentiality property,which can efficiently prevent attacking from external attackers and cheating among participants.Any information can be delivered in the form of plaintext,and secure channel is unnecessary.The scheme allows participants to be added or deleted dynamically,the secret and adversary structure can be renewed without renewing the secret share of every participant.The security of the scheme is based on that of Shamir’s secret sharing scheme and the intractability of discrete logarithm problem.

Key words: information security, secret sharing, weighted, adversary structure