Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of South China University of Technology(Natural Science Edition)》 2007-01
Add to Favorite Get Latest Update

Verifiable(t,n) Threshold Secret-Sharing Scheme and Its Security

Pang Liao-jun~1 Li Hui-xian~2 Wang Yu-min~1(1.State Key Laboratory of Integrated Service Networks,Xidian Univ.,Xi'an 710071,Shaanxi,China;2.School of Computer Science and Engineering,Northwestern Polytechnical Univ., Xi'an 710072,Shaanxi,China)  
In order to share a secret among a group of participants without a trusted center and to prevent the parti-cipants from cheating each other,a dynamic and verifiable(t,n) threshold secret-sharing scheme is proposed.In this scheme,the secret shadow of each participant is negotiated by all participants,and the secret dealer does not have to distribute any secret shadow.So,in the process of secret distribution,the dealer is only asked to compute some public values without sending any information to each participant. Furthermore,in the process of secret reco-very,each participant of a cooperative only submits a pseudo-shadow computed via the secret shadow to the secret computer,and anyone is allowed to check the validity of the pseudo-shadow.The security of the proposed scheme can be effectively guaranteed due to the difficulty in solving the discrete logarithm problem.
【Fund】: 国家“973”计划项目(G1999035805);; 国家自然科学基金资助项目(50479055)
【CateGory Index】: TN918.1
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 Yu Yang,Liu Huanping(Harbin Normal University);The Asmuth-bloom Verifiable Threshold Sharing Scheme[J];Natural Science Journal of Harbin Normal University;2012-03
【Citations】
Chinese Journal Full-text Database 1 Hits
1 Li Hui-xian~1 Cheng Chun-tian~2 Pang Liao-jun~3(1.Dept.of Computer Science and Engineering,Dalian Univ.of Tech.,Dalian 116024,Liaoning,China;2.Institute of Hydropower System and Hydroinformatics,Dalian Univ.of Tech., Dalian 116024,Liaoning,China;3.National Key Laboratory of Integrated Service Networks,Xidian Univ.,Xi'an 710071,Shaanxi,China);Multi-Secret Sharing Scheme with General Access Structures[J];Journal of South China University of Technology(Natural Science Edition);2006-06
【Co-citations】
Chinese Journal Full-text Database 2 Hits
1 ZHANG Ji-De QU Er-Qing HE Zhi-Fang(College of Computer and Automatic Control, Hebei Polytechnic University ,Tangshan 063009);Design of Security Management Platform Based on Publish-subscribe System[J];Computer Science;2008-04
2 ZHANG Jian-zhong,QU Juan(College of Mathematics and Information Science,Shaanxi Normal University,Xi'an 710062);Weaknesses Analysis and Improvement of Three Secret Sharing Schemes[J];Computer Engineering;2010-07
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 CHEN Yongzhi1,2,LIU Yun1,WEN Xiaojun1,3(1.Key Laboratory of Communication and Information Systems,Beijing Municipal Commission of Education,Beijing Jiaotong University,Beijing 100044,China;2.Department of Electronics & Information Engineering;Shijiazhuang University, Shijiazhuang 050035,China;3.School of Electronics & Information Engineering,Shenzhen Polytechnic,Shenzhen 518055,China);A Proxy Signature Scheme Based on Controlled Quantum Teleportation[J];Journal of Beijing Jiaotong University;2010-05
2 DAI Yuan-Jun,MA Chun-Guang,YANG Yi-Xian (Information Engineering School, Beijing University of Posts and Telecommunications, Beijing 100876, China);An Kind of (t, n)Threshold Secret Sharing Based on Lagrange Insert Value[J];Journal of Beijing University of Posts and Telecommunications;2004-02
3 QIN Hua-wang,DAI Yue-wei,WANG Zhi-quan (School of Automation,Nanjing University of Science and Technology,Nanjing 210094,China);Threshold Signature Scheme Based on the General Access Structure[J];Journal of Beijing University of Posts and Telecommunications;2009-06
4 ZHANG Qing-hua (College of Computer Science and Technology,CUPT,Chongqing 400065, China);Researching of Discrete Logarithm's Primitive Root in Key Exchange[J];Journal of Chongqing University of Posts and Telecommunications;2002-03
5 PANG Liao-jun1,2,LI Hui-xian3,WANG Yu-min2 (1. Institute of Intelligent Information Processing, Xidian University Xi'an 710071;2. Key Laboratory of Computer Network and Information Security of Ministry of Education, Xidian University Xi'an 710071;3. School of Computer Science and Engineering, Northwestern Polytechnical University Xi'an 710072);A Secure and Efficient Secret Sharing Scheme on Access Structures[J];Journal of University of Electronic Science and Technology of China;2007-05
6 WU Yan,GENG San-jing (Department of Computer Science and Technology,Henan Polytechnic University,Jiaozuo 454000,China);(t,n) Threshold Signature Scheme without a Trusted Party[J];Computer Knowledge and Technology;2008-29
7 ZENG Gui-hua 1,MA Wen-ping 2,WANG Xin-mei 2,ZHU Hong-wen 1( Electrical engineer department of Shanghai Jiaotong university,Shanghai 20003 0,China; National Key lab.on ISN,Xidian university,Xi'an,Shanxi 710071,China);Signature Scheme Based on Quantum Cryptography[J];Acta Electronica Sinica;2001-08
8 ZHANG Fu-tai,WANG Yu-min(1.Po.Box 119,Key Lab.of ISN,Xidian University,Xi′an,Shanxi 710071,China; 2.School of Computer Since,Shanxi Normal University,Xian,Shanxi 710072,China);Construction of Secret Sharing Schemes on Access Structures with Transfer Property[J];Acta Electronica Sinica;2001-11
9 XU Chun-xiang,XIAO Guo-zhen (Key Laboratory of Computer Network & Information security,Ministry of Education,Xidian University,Xi'an,710071,China);A Threshold Multiple Secret Sharing Scheme[J];Acta Electronica Sinica;2004-10
10 PANG Liao-jun1,2,JIAO Li-cheng1(1.Institute of Intelligent Information Processing,Xidian University,Xi'an,Shaanxi 710071,China; 2.The Ministry of Education Key Lab of Computer Networks and Information Security,Xidian University,Xi'an,Shaanxi 710071,China);Changeable Threshold Signature Scheme without a Trusted Center[J];Acta Electronica Sinica;2008-08
【Secondary References】
Chinese Journal Full-text Database 3 Hits
1 HONG Han-shu;SUN Zhi-xin;Key Laboratory of Broadband Wireless Communication and Sensor Network Technology,Ministry of Education,Nanjing University of Posts and Telecommunications;;Bigdata Storage Security Based on Cloud Computing[J];Journal of Nanjing University of Posts and Telecommunications(Natural Science);2014-04
2 YANG Yong;CHEN Yong yuan;LIU Lei feng;Chongqing Institute of Green and Intelligent Technology,Chinese Academy of Sciences;;DHT- based Model for Distributed Cloud Disaster Recovery[J];Communications Technology;2014-06
3 Yang Hong;;Research of Data Secure Storage Status Based on Cloud Disaster[J];Network Security Technology & Application;2014-07
【Secondary Citations】
Chinese Journal Full-text Database 2 Hits
1 Liu Yi Xu Wen-li Wang Yu-min(State Key Laboratory of Integrated Service Networks, Xidian Univ., Xi’an 710071, Shaanxi, China);A Secure Payment Protocol Using Mobile Agents Based on Verifiable Secret Sharing[J];Journal of South China University of Technology(Natural Science);2005-06
2 Pang Liaojun, Wang Yumin (National Key Lab of Integrated Service Networks, Xidian University, Xi′an 710071, China);A (t, n) Multi-Secret Sharing Scheme Based on Geometric Property[J];Journal of Xi'an Jiaotong University;2005-04
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved