Font Size: a A A

Secret Sharing Scheme And It’s Application In Signature

Posted on:2014-01-21Degree:MasterType:Thesis
Country:ChinaCandidate:H J WangFull Text:PDF
GTID:2248330398976780Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The cryptography is divided into traditional cryptography and modern cryptography, whose main task is to ensure communication security in an insecure environment. In cryptography, no matter what kind of crypto-system, the security of the key determines the entire security of the cryptographic system; key leak means the loss of the entire crypto-system security. Therefore, the key management has become a hot spot in recent research.Secret sharing system is to solve the original decentralized management of public-key in modern cryptography. The idea is:splitting secret in a proper way, so each share after the splitting is managed by different participants separately; individual participants cannot get any information of the original secret through his secret share, and only through the cooperation of a number of participants can the secret message be recovered.Digital signature technology, a signature of electronic information, makes it possible to achieve the similar effect of handwritten signature. The digital signature can verify the validity and integrity of the file information and to verify the authenticity of identity. Its essence is to store information in the form of electronic messages so as to ensure the security of information and communication. Threshold signature system combines threshold secret sharing system with digital signature system; ordinary digital signature is generated by a single individual, while threshold signature is produced by a number of participants.The traditional threshold secret sharing scheme assumes that individual participant in the sharing of secret has exactly the same privileges; in other words, participants’identities are not distinguished. It also assumes that the relationship between the secret dealer and the participants sharing a secret is honest. However, in real life, this assumption does not hold water. Therefore, researches on secret sharing system based on general access structure and no-trusted center have a very wide range of theoretical and practical significance. This article briefly introduces the secret sharing system, with an in-depth research and study of classic schemes within various systems, and a serious analysis of the limitations and shortcomings of the schemes. Then, to solve the problems of general access structure and deception between participants existing in the traditional secret sharing scheme, several relatively safe and effective secret sharing schemes and digital signature schemes are designed.Concerning secret sharing system’s framework, the secret sharing scheme based on the general access structure and its digital signature scheme are proposed to solve the problem of general access structure in the secret sharing system. The scheme adds a bulletin board; according to the sub-secret produced by the access structure, the dealer publish some parameters; the participants, in accordance with the sub-secret distributed by the dealer, can restore the original secret through cooperation.Concerning the secret sharing system’s content, the secret sharing scheme base on no-trusted center and its digital signature scheme are proposed to solve the problem of conspiracy attack in secret sharing system. In the scheme, each participant is both a dealer and a secret sharing participant; the original secret is unknown, and in its digital signature scheme, the original secret can be implicitly recovered and the validity of the signature can be verified.Concerning secret sharing system’s design, blind signature scheme based on quantum non-entangled state is proposed to deal with the problems in secret sharing system based on the security of difficult mathematical problems. In the scheme, the idea of no-entangled state quantum secret sharing proposed by Professor Guo Guangcan will be applied to the actual digital signature; so, the need for the preparation of quantum state is avoided and quantum entangled state’s equal effect of unconditional security is also achieved.
Keywords/Search Tags:secret sharing scheme, digital signature, zero-knowledge proof, conspiracy attack, the general access structure
PDF Full Text Request
Related items