首页 | 本学科首页   官方微博 | 高级检索  
     

基于异或运算的份额可更新(2,n)门限秘密共享方案
引用本文:刘鹏,李飞. 基于异或运算的份额可更新(2,n)门限秘密共享方案[J]. 科学技术与工程, 2009, 9(14)
作者姓名:刘鹏  李飞
作者单位:鲁东大学数学与信息学院,烟台,264025;鲁东大学数学与信息学院,烟台,264025
摘    要:传统的Shamir(k,n)门限秘密共享方案,需要复杂的Galois域Fp中的大量运算,效率较低,不能适应传感器网络、RFID等资源受限的应用环境。为了解决这个问题,Y.Fujii和N.Hosaka等人提出了一种基于纯粹异或运算的(2,n)门限秘密共享方案。该方案效率较Shamir方案有很大提高,但是该方案的秘密份额不具备定期更新性。针对这一问题,提出了一种基于异或运算的可更新门限秘密共享方案,兼具效率较高和份额定期更新的特点,特别适合传感器网络、射频卡、Smart卡等资源紧张的安全环境。

关 键 词:门限秘密共享方案  异或  份额更新

New (2,n)Threshold Secret Sharing Scheme with Share Refreshing Based on XOR Operations
LIU Peng,LI Fei. New (2,n)Threshold Secret Sharing Scheme with Share Refreshing Based on XOR Operations[J]. Science Technology and Engineering, 2009, 9(14)
Authors:LIU Peng  LI Fei
Affiliation:Ludong University;Yantai 264025;P.R.China
Abstract:The traditional Shamir(k,n)threshold serect sharing scheme needs a lot of complex computation in the Galois field Fp.So it can not be used in the resource-restricted environment such as sensor-networks and RFID.To solve such problems,Y.Fujii and N.Hosaka et al,proposed a new(2,n)threshold secret sharing scheme which is much more efficient than Shamir's one.However,the secret share in their scheme can not be refreshed.With respect to this point,a new(2,n)threshold secret sharing scheme based on xor operation...
Keywords:threshold secret sharing scheme XOR operation share refreshment.  
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号