Font Size: a A A

Secret Sharing Based On Special Permission Applications

Posted on:2012-06-12Degree:MasterType:Thesis
Country:ChinaCandidate:L FangFull Text:PDF
GTID:2218330338970048Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The so-called secret sharing is to protect important information in order to prevent the loss of important information, or destruction, tampering and use of a group of participants in the technical means to share secret information. In recent years, shared control or management of the key issues of security in cryptography research and design plays a very important position. This is because at this stage with the development of information technology and computer and communication systems popular, modern society is dependent on the network increasing, the network also involves the application of all aspects of life such as electronic auctions, electronic bidding, online banking and electronic cash transactions and so on. However, the application of the network, also found many problems, such as how to ensure the information in the process of generation and transmission security, the problem caused by the professionals more and more attention, and has become a modern password an important field of study. Modern cryptography systems are basically the design and research conducted in Kerckhoff's assumption, the assumption for this security of cryptographic algorithms depends almost entirely on the security of the key, so the secret sharing in the cryptosystem the position is increasing. Meanwhile, the secret sharing is an important key distribution based on cryptographic secret sharing is an important part of the research and direction. Meanwhile, cryptography secret sharing is a very important tool for protecting data and information is an important means by which information security plays a very important role. Currently a typical secret sharing scheme are the following: traditional secret sharing, verifiable secret sharing and multi-secret sharing.This study is mainly based on secret sharing scheme of special privileges the construction and application. The main work is the theory of sharing the secrets of the past similar conduct in-depth research and systems analysis, and then a detailed understanding of game theory, based on Game Theory reference, special permission was given based on the concept of rational secret sharing, and to propose a new program, and gives proof of its correctness, analyze its applicability.First, the paper gives the Review of secret sharing, research and analysis of a typical secret sharing scheme. Focuses on the concept of game theory, typical programs and development described in detail the definition of Nash equilibrium, and the Nash equilibrium mixed strategy was illustrated, and discussed the limitations of the Nash equilibrium problem.Secondly, the paper gives special privileges based on secret sharing schemes are reviewed. In the given special privileges based on secret sharing schemes based on the concept and meaning, detail several typical special privileges based on secret sharing schemes, to do the analysis.Finally, based on special privileges based on secret sharing schemes based on the study, we propose a model more similar with the reality of the new secret sharing scheme, which is based on secret sharing scheme of special privileges. Prior to this secret sharing scheme is basically only meet the basic needs of the most common, however, if the participating members of the special status of some participants to master the different identities of the participants how many different secret, that is, in access to different persons, which requires the need to modify existing programs and new programs to meet these special needs. Li Bin, we have studied the special privileges based on secret sharing, the program made him some analysis, then a combination of rational secret sharing scheme, we propose a new special privileges based on rational secret sharing scheme, in The new program, participants access to different, and are rational actors. Subsequently, the new special privileges based on rational secret sharing scheme to be proved the correctness of us, and the applicability of the program also made the corresponding discussion, and give some application areas.
Keywords/Search Tags:Game Theory, Cryptology, Nash Equilibrium, Secret Sharing, special privileges
PDF Full Text Request
Related items