Font Size: a A A

Research And Design Of Extension Form Of Secret Sharing Scheme

Posted on:2015-05-05Degree:MasterType:Thesis
Country:ChinaCandidate:L L NiFull Text:PDF
GTID:2308330464968685Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the development of information society, information security is increasingly attracting widespread attention. At the core of information security in cryptography, a key encryption algorithm or signing algorithm used in the security problem is crucial, especially in the construction of multi-level security at the top of this key(hereinafter referred to as the primary key), if an administrator to keep alone, on the operation it may bring the following drawbacks:(1) each time the administrator attend in order to get the master key;(2) if the administrator accident died, the master key will never be lost, which affect system operation;(3) if the administrator will sell the master key to others, which will affect the safety of the whole system.Using secret sharing technology can thoroughly solve the above problem. So-called secret sharing keep secrets(such as the primary key) in the above offer participants a set of separate custody of all members, if and only if the collection of all the members in an authorized subset show their secret share to recover the Shared secrets, while the unauthorized subset members can not get any information about the secret.This paper first summarizes the research status of secret sharing technology; Secondly, put forward a partial broadcast channel secret sharing schemes, and gives some research in terms of its security and efficiency results; Third, this paper puts forward a anti-cheating secret sharing system, and study several major aspects of security. In particular, the results of this paper includes the following several aspects:1. Partial broadcast channel is in one-to-many channel that message transfer under the channel of distribution, its secret sharing scheme structure is equivalent to a set(every message of t -1 channel do not contain other remaining channel). This paper presents a method of construction set, then the efficiency(including channel efficiency and communication efficiency) are analyzed. Efficiency analysis in the distribution channel that fixed and change: two cases discussed for fixed and changed channel distribution situation, secret sharing scheme construct with access structures; For the channeldistribution change situation, with perfect hash family to construct. The derived results show that they communication efficiency higher than the traditional on one-to-one channel to send a sharing secret.2. The traditional secret sharing system generated by the Shared secret algorithm and Shared secret recovery algorithm, the improvement of anti-cheating secret sharing system design Shared secret recovery algorithm with identify function, when the deceiver did not appear, it will restore the secret; When a deceiver appear, it can restore special symbol. This paper consider respectively from arbitrary polynomial over finite field multiplication and inverse perspective, the research constructs two kinds of anti-cheating authentication function, and discusses the various conditions of the fraud cases and computes its corresponding probability.
Keywords/Search Tags:secret sharing system, anti cheat function, part of the radio channel, the communication rate
PDF Full Text Request
Related items