Font Size: a A A

Research About Verifiable Secret Sharing And Its Application

Posted on:2007-03-20Degree:MasterType:Thesis
Country:ChinaCandidate:F LiuFull Text:PDF
GTID:2178360185458719Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Verifiable secret sharing is one of the most important tools in modern cryptography, and it is also one of basic tools in keeping secrets. Since the concept of verifiable secret sharing has been raised, many scholars have researched about it and they have raised some security and efficient verifiable secret sharing schemes. Utilizing verifiable secret sharing to keep secrets is not only prevented power from being .kept centralized, but also kept security and integrity of informations. In addition, the shares can check up cheating in order to keep the standard shares recovering the shared secret. So verifiable secret sharing is extensively used in the field of keeping secret keys,data security, management of bank net and missile management and launching. Moreover, it is used to structure worthily cryptographic arithmetic in combination with data signature and identification, which expanded verifiable secret sharing schemes' application. Others scholars research about its applications in threshold cryptography,secure multiparty computation, escrow and electronic commerce. By careful analysis and summarizing the actuality in this field(concrete conclusions will be given in chapter 1), we find out that there are four inadequate. Firstly, there are less secure and efficient threshold schemes; secondly, the research on multi-secret sharing is rather weak; thirdly, usual verifiable secret sharing don't consider the partners' anonymity, while it is just people's expectation. Last but not least, the problem of variety on shares is becoming a more obvious restrict of efficiency, especially in the facets of the lost and being districted of shares. On the application of verifiable secret sharing, there are also two inadequates: on the one hand, verifiable secret sharing has been used in much threshold cryptography but in less verifiable signatures. On the other hand, the research on the use of verifiable secret sharing in electronic commerce is not enough deep. Aimed at the above problems, we deeply research on the design of verifiable secret sharing, strong verifiable secret sharing, the application in the facets of signature and electronic commerce.On the basic of problems of being raised above, the paper discusses the design of secrete, efficient verifiable secret sharing schemes and the applications in the field of data signature and e-cash. The main contributions are following:1. On the research of secure and efficient threshold verifiable secret sharing...
Keywords/Search Tags:verifiable secret sharing, strong verifiable secret sharing, publicly verifiable, digital signature, e-cash
PDF Full Text Request
Related items