Font Size: a A A

The Study Of Vertifiable Multi-secret Sharing Scheme And Its Application

Posted on:2011-05-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2178360305976546Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Multi-secret sharing is an important direction of cryptography technology, it provides an effectivve approach to saving and utilizing legally important information. It is a major subjet of information security. It can not only prevent the excessive concentration power from being abused but also guarante the security and integrity of the secret if it used for keeping secret.This thesis reviews the backgrounds and research advances of the secret sharing. It carries on deep reaserch to multi-secret from two aspects which are threshold scheme and general access sructure, and then applicate it to signature with shared verification scheme and electronic auction protocol. Firstly, we analyze YCH threshold multi-secret sharing scheme, and point out its serious shortage in security. We propose a secure scheme which dose not need a secure channel and each participant chooses his secret shadow by himself, and can defend positive attack of dealer and participants. Secondly, based on general access structure, we propose a verifiable multi-secret sharing scheme. In this scheme, dealer can share any new secret among these participant dynamically, and the secret shadow of each participant can reuse. Compared with the existing some schemes, the proposed scheme reduces the number of modular exponentiation operations in preventing the dealer or each participant from cheating. It is a secure and efficient multi-secret sharing scheme. Thirdly, we present a signature with shared verification scheme based on verifiable multi-secret sharing. This scheme effectively overcome the deficiencies of the previous schemes in terms of security. In the process of signature verification, validation group can prevent some members provide the faulted information. This can make verification failure. This scheme use verifiable multi-secret sharing, so it can verify many signatures when it make once multi-secret sharing. It has higher efficiency. Finally, we study the multi-secret sharing which is applicated in electronic auction protocol, and then design a secure electronic auction protocol and realize this protocol. The experiment shows that the security of multi-secret sharing scheme is improved in a certain extent because of the contribution of this paper, and it has an important value to further application of multi-secret sharing. Therefore, the research of this paper is significant to verifiable multi-secret sharing coming into utility.
Keywords/Search Tags:Multi-secret Sharing, VMSS, General Acess Structure, Signature with Shared Verification, Electronic Auction
PDF Full Text Request
Related items