Font Size: a A A

Application Research Of Security Scheme Based On Shamir's Secret Sharing

Posted on:2016-04-07Degree:MasterType:Thesis
Country:ChinaCandidate:J X MoFull Text:PDF
GTID:2428330473964939Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Information security is a major issue faced by the current development of the Internet.Encryption and decryption,identity information,digital signature and private key exchange are important mechanism to protect information security,which rely on privacy of private key.Secret sharing is a technology shared secret in a group of participants,can provide good safety mechanism for privacy of private key,and thus has been widely used.With the secret sharing technology application in security practical,some participants deceive the other members by providing ineffective shadows,which will not only leads to a secret recovery failure,but also bring inconvenience to members of the secret sharing and information safety hidden trouble.According to the above problem,the paper propose two program: anti-fraud proactive multi-secret sharing(scheme I)and application research on secret sharing anti-spoofing scheme in crowdsource mode(scheme II).The main work of this paper is as follows:(1)Study mult-secret and proactive secret sharing scheme.Aimed at cheat problem of shadows in the process of secret sharing secret,Use different method of shadows generation propose proactive multi-secret sharing scheme.The program was used to actual environment required long-term share secret.Multiple secrets can be shared among many participants and shadows can be periodically renewed without changing these secrets.Meanwhile,based on the intractability of the discrete logarithm,the participants can verify authenticity of shadows to prevent the occurrence of member deceptive problems.(2)Analyze existing secret sharing scheme.Aiming at more than t participants in secret recovery crowdsourcing service mode,based on Shamir secret sharing secret define method of shadow generation by introducing a linear combination of the shadows—Lagrange factor,and verify the correctness and analyze security.(3)Use open-source tool Test Data Builder to generate random parameters: number of shadows,polynomial and threshold;apply My Eclipse8.6 and Cloud Sim environment to carry on the simulation experiment for single secret of scheme II.Analysis and simulation experiments show: in scheme I,based on the intractability of the discrete logarithm,the participants can verify authenticity of shadows to prevent the occurrence of member deceptive problems.Under the same complexity scale with another schemes,scheme II ensures the safety of shadows and prevents cheater getting secret,which provides a new project in improving security of secret sharing mechanism.
Keywords/Search Tags:Secret Sharing, Lagrange Factor, Cheater, Secret Recovery, CSSM
PDF Full Text Request
Related items