Font Size: a A A

Research On Secret Sharing Scheme

Posted on:2008-01-15Degree:MasterType:Thesis
Country:ChinaCandidate:Z Z GuoFull Text:PDF
GTID:2178360212995646Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Secret sharing is a technology of sharing secret among a group of participants. Their major function is to protect important information from missing, being destroyed and being changed. Therefore, secret sharing is an important research field and an effective tool in cryptophytic theory. Secret sharing plays an important role in information security.Chein proposed a new mult-secret sharing (t, n) threshold scheme basing on the block encryption. An improved protocol is proposed by Pang Liao-jun with the strong point in the secrets recovering. However, this scheme with the flaw in the security . Basing on Shamir's (t, n) threshold scheme, Feldman VSS(Verifiable Secret Sharing) scheme, and Pang Liao-jun's scheme, a new improved (t,n) verifiable secret sharing is proposed in this paper. In this scheme, not only with the merit of original protocol that can reconstruction all secrets in one time secret reconstruction computing, but also this scheme can prevent the dealer cheating by the mean of realizing the function of enable participants verifying the shared secret. Therefore, our scheme is better in security and more convenient than that of other multi-secret sharing schemes.Meanwhile, Dong proposed a member expansion in secret sharing scheme with 6t broadcast, decreased the storage complexity in broadcasting. An improved protocol is proposed by Li which realize the function than the new participant can verifiable his shared secret. We basing on the method of verifiable protocol for member expansion in secret sharing scheme, applying the method in the multi-secret sharing scheme, a new member expansion and verifiable protocol multi-secret sharing scheme are proposed. In the scheme, not only realize the function of a member expansion, but also with the merits in both original papers that reconstruction all secrets in one time secret reconstruction computing; the new participant can verifiable his shared secret and more convenient in broadcasting communication.Moreover, Theodore M. Wong proposed Verifiable Secret Redistribution Scheme for Archive Systems, in this paper a Verifiable Secret Redistribution (VRS) Scheme was given. We apply the method of VSR scheme to adapt motile-secret sharing scheme and a VSR motile-secret sharing scheme is proposed. In our scheme, not only with the function secret shares redistribution and participants verifiable their shares.
Keywords/Search Tags:Information security, Secret sharing, Multi-secret sharing, VSS (Verifiable Secret Sharing)
PDF Full Text Request
Related items