Font Size: a A A

Research On Some Aspects In Secret Sharing

Posted on:2009-02-07Degree:MasterType:Thesis
Country:ChinaCandidate:R HaoFull Text:PDF
GTID:2178360245496094Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the develpment of the technique about computer network, network sevices have brought many conviences to people's life. On the other hand, they bring an unparalleled threat. How to guarantee the confidentiality, integrity and availability of the data transferred in network is an urgent problem. The technique of cryptology and information security is an effective means to deal with this problem.In cryptology and information security, secret sharing is an important research domain. The secret sharing scheme can divide the secret key into several shares and share them in multiple servers. Each server holds one share of the secret. Only no fewer than a certain number of shares can reconstruct the secret, while fewer than the certain number can't computer this secret. The secret sharing can be applied to multiple secure computation, threshold signature, threshold encryption, secure storage and so on.In this paper, we firstly introduce the current research backgroup of secret sharing. And then discuss several aspects of research work in secret sharing including proactive secret sharing, data content secret sharing scheme, and verifiable multiple-players enrollment protocol for secret sharing.These research results can widely applied to distributively secure storage of the data, e-cash system in electronic commerce, and multiple-parties computation and so on.
Keywords/Search Tags:secret sharing, verifiable secret sharing, publicly verifiable secret sharing, threshold scheme, multiple-parties secure compuation
PDF Full Text Request
Related items