Font Size: a A A

Secret Sharing Scheme

Posted on:2012-02-29Degree:MasterType:Thesis
Country:ChinaCandidate:F GuoFull Text:PDF
GTID:2218330368493986Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Secret sharing is a very important research content of cryptography.The secretsharing technology is mainly applied in information protection against informationlost, destroyed and modified. It is known as a very effective measure of informationprotection and data security in modern society. Also it plays an important role ininformation security.This thesis mainly introduced the basic concepts of secret sharing. At themeantime, verifiable secret sharing and multi-secret sharing are also studied§whichconsists of the following aspects:1.Based on Parakh et al.'s threshold secret sharing scheme that provides spaceeffciency, Improved the scheme and made it into multi-secret sharing.The nature isstill existed and have more significant value for apply.2.The main contribution of it is the study of verifiable multi-secret sharingscheme. Based on one-way function and LUC cryptosystem, two verifiable multi-secret sharing schemes with general access structure are proposed.The advantagesas follows:1)The truth of information provided by participants can be verified both insecret distribution and recovery phase.2)In the information recovery phase, each participant in the feasible set canshare multi secrets if he can submit the pseudo-share of a sub-secret. While access-ing the structure or updating secrets, the secret recovery can be finished withoutchanging the share of participants.3)This scheme also realized that in the secret recovery phase§only the neededsecrets will be recovered,which overcome the disadvantage of recovering all secretsone time.4)The scheme which is based LUC cryptosystem uses each participant's privatekey as his sub secret, the secure channel between the secret dealer and participantsdo not need to maintainff...
Keywords/Search Tags:Multi-secret sharing, Verifiable secret sharing, LUC cryptosystem, Space effciency
PDF Full Text Request
Related items