首页 | 本学科首页   官方微博 | 高级检索  
     

特殊门限秘密共享方法及其应用
引用本文:唐韶华. 特殊门限秘密共享方法及其应用[J]. 华南理工大学学报(自然科学版), 2007, 35(10): 168-171,177
作者姓名:唐韶华
作者单位:华南理工大学,计算机科学与工程学院,广东,广州,510640
基金项目:国家自然科学基金资助项目(60572139),霍英东教育基金会资助项目(101069),教育部新世纪人才支持计划(NCET-06-0744)
摘    要:从电子招投标系统的实际需求出发,提出了特殊门限秘密共享的概念,即具有指定人必须参与、以组为单位、指定组必须参与等性质特征的秘密共享方法.相应于实际需求,基于Shamir秘密共享原理,采用多重门限的方法设计了指定人必须参与的秘密共享、以组为单位的秘密共享、指定组必须参与的秘密共享等算法,解决了实际问题.理论分析表明,文中算法是安全、有效的.所设计的算法已被实际应用于电子招投标系统中,经实践证明,系统运行稳定,算法的执行效率高.

关 键 词:秘密共享  门限密码  特殊门限秘密共享  电子招投标
文章编号:1000-565X(2007)10-0168-04
收稿时间:2007-03-01
修稿时间:2007-03-01

Special Threshold Secret Sharing Methods and Their Applications
Tang Shao-hua. Special Threshold Secret Sharing Methods and Their Applications[J]. Journal of South China University of Technology(Natural Science Edition), 2007, 35(10): 168-171,177
Authors:Tang Shao-hua
Abstract:Based on the practical requirements of the electronic bidding system,the concept of special threshold secret sharing is proposed,which owns the features and properties of that the designated person must participate,that a group acts as a unit,or that the designated group must participate.Corresponding to the actual requirements,some secret sharing algorithms are designed to solve the practical problems by adopting the multi-threshold method based on Shamir's secret sharing principle,which include the one that the designated person must participate,the one that a group acts as a unit,and the one that the designated group must participate.It is shown by theoretical analysis that the proposed algorithms are secure and effective.Moreover,the designed algorithms are practically applied to an electronic bidding system.The results indicate that the system runs stably and the algorithm works efficiently.
Keywords:secret sharing  threshold cryptography  special threshold secret sharing  electronic bidding
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号