首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于多项式环与ECC的门限密钥共享方案改进
引用本文:刘新汉,谢晓尧.基于多项式环与ECC的门限密钥共享方案改进[J].贵州科学,2011,29(1):55-58.
作者姓名:刘新汉  谢晓尧
作者单位:1. 贵州师范大学,数学与计算机科学学院,贵阳,550001;贵州省信息与计算科学重点实验室,贵阳,55001
2. 贵州省信息与计算科学重点实验室,贵阳,55001
摘    要:在Shamir门限密钥共享方案的基础上,提出二级多项式插值法重构共享主密钥的方法,基于多项式环与椭圆曲线离散对数问题(ECDLP),改进了(t,n)门限密钥共享方案.新方案基于二级多项式重构的复杂性与ECDLP的难解性.新方案同时引入密钥共享者身份标识,创造性地将子密钥二维向量化,降低子密钥泄露带来的风险.新方案同时具...

关 键 词:(t  n)门限密钥共享  多项式环  ECC  拉格郎日插值法

Improement of Threshold Secret Sharing Scheme Based on Polynomial Ring and ECC
LIU Xin-han,XIE Xiao-yao.Improement of Threshold Secret Sharing Scheme Based on Polynomial Ring and ECC[J].Guizhou Science,2011,29(1):55-58.
Authors:LIU Xin-han  XIE Xiao-yao
Institution:1School of Mathematics and Computer Science,Guizhou Normal University,Guiyang,Guizhou 550001,China;2Key laboratory of Information and Computing Science of Guizhou Province,Guiyang,Guizhou,550001,China)
Abstract:On the basis of Shamir threshold secret sharing scheme,this paper brought a new idea of two-level polynomial interpolation and reconstruction of the shared master key,improved the(t,n) threshold secret sharing scheme based on polynomial ring and the elliptic curve discrete logarithm problem(ECDLP).The new scheme was based on the complexity of two-level polynomial reconstruction and the intractability of ECDLP.The new scheme also introduced identity of secret sharer,created two-dimensional sub-key to decentralize the risks of sub-key revealed.It also had the function to dynamically manage shared sub-key.Theoretical analysis showsed that security of the new scheme was better than the original(t,n) threshold secret sharing scheme.
Keywords:ECC
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号