Font Size: a A A

Research Of The Rational Secret Sharing Technology

Posted on:2012-04-11Degree:MasterType:Thesis
Country:ChinaCandidate:L L JiangFull Text:PDF
GTID:2218330368480346Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Secret sharing is an important tool for the data privacy and the communicationsecurity, and it plays an important role in protecting important information andsecret data from being lost, destroyed or viciously modified. The study on the theoryof secret sharing is not only significant, but also enjoys the bright prospect of theextensive applications. In this dissertation, the background and present situationof secret sharing are reviewed, the strength and weakness of secret sharing schemesin applications are studied. Based on these overviews, the dissertation concentrateson how to design secure and e?ective secret sharing protocol, and design severalsecret sharing schemes. The main results are as follows:1. Analyze the strength and weakness of the present rational secret sharingschemes, improvement a present rational secret sharing, that this scheme can verifythe shadow-keys and sub-keys right or not.2. For the weakness of the present rational secret sharing protocol, we studyit from the following two aspects: Investigate the present rational secret shar-ing protocols, we find that all the rational secret sharing protocols need a secretdistributing center, however a authentic secret distributing center is impossible,so , we Establish a new rational secret sharing protocol without secret distribut-ing center based on the interact operation and lagrange interpolation polynomial.
Keywords/Search Tags:Information Security, two variable one-way function, Rational secret sharing, Secret Distributing Center, interact operation
PDF Full Text Request
Related items