首页> 外文期刊>Wireless personal communications: An Internaional Journal >A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
【24h】

A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps

机译:一种基于双线性图的可验证的多秘密共享方案

获取原文
获取原文并翻译 | 示例
           

摘要

In a (t, n)-threshold multi-secret sharing scheme, several secrets are shared among n participants in such a way that any t (or more) of them can reconstruct the secrets while a group of (t - 1) can not obtain any information. Therefore, when such schemes are used to distribute sensitive information over a network, fault tolerance property is achieved since even if n - t of the nodes go out of function, the remaining t nodes suffice to recover the information. In 2009, Wang et al. proposed a verifiable (t, n)-threshold multi-secret sharing scheme (WTS) based on elliptic curves in which the secrets can change periodically [Wireless Pers. Commun., Springer-Verlage, doi:10.1007/s 11277-009-9875-0]. In this paper, we propose a verifiable (t, n)-threshold multi-secret sharing scheme based on bilinear maps. Our scheme does not require a secure channel and participants can verify the shares pooled in the reconstruction phase. Our proposed scheme is multi-use such that in order to change the secrets, it is sufficient to renew some public information. Furthermore, the proposed scheme is flexible to the threshold value. Therefore, our proposed scheme has all the merits of (WTS), however, we achieve two major improvements. First when the secrets are to be changed, we require to publish fewer public values. This reduction can be very important in certain applications such as steganographic use of secret sharing schemes. The second is that (WTS) is designed with the assumption that the number of secrets (m) is equal to the threshold t so that the case m > t is handled by repeating the scheme [m/t] times. However, in designing the scheme we do not assume any restrictions on the number of secrets.
机译:在(t,n)个阈值的多秘密共享方案中,n个参与者之间共享了几个秘密,使得他们中的任何t个(或更多个)都可以重建秘密,而一组(t-1)则不能。获取任何信息。因此,当使用这样的方案在网络上分发敏感信息时,由于即使n-t个节点失效,其余的t个节点也足以恢复信息,所以可以实现容错特性。 2009年,Wang等。提出了一种基于椭圆曲线的可验证(t,n)阈值多秘密共享方案(WTS),其中秘密可以定期更改。通讯,Springer-Verlage,doi:10.1007 / s 11277-009-9875-0]。在本文中,我们提出了一种基于双线性图的可验证(t,n)阈值多秘密共享方案。我们的方案不需要安全通道,参与者可以验证在重建阶段合并的份额。我们提出的方案是多用途的,因此为了更改秘密,更新一些公共信息就足够了。此外,所提出的方案对于阈值是灵活的。因此,我们提出的方案具有(WTS)的所有优点,但是,我们实现了两个主要改进。首先,当要更改机密时,我们要求发布较少的公共价值。在某些应用程序中,例如秘密使用秘密共享方案,这种减少可能非常重要。第二个原因是(WTS)是在假设秘密数(m)等于阈值t的情况下设计的,从而通过重复方案[m / t]次来处理m> t的情况。但是,在设计方案时,我们不对秘密数量进行任何限制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号