Font Size: a A A

Research On Multi Secret Sharing Of Self Selected Subsecret

Posted on:2019-02-07Degree:MasterType:Thesis
Country:ChinaCandidate:S T LinFull Text:PDF
GTID:2428330578472923Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
In the information age,information security has become a very important problem in today's society.Encryption algorithms,digital signatures and identity authentication in cryptography have strengthened the protection of secrets,but the secret protection is not enough.So the secret sharing provides a new way of thinking for the protection of the key.With the continuous study of secret sharing,secret sharing from single secret sharing to multi secret sharing is gradually becoming mature and perfect.The multi secret sharing scheme is studied in this paper.Multi secret sharing means that multiple secret sharing can be achieved in one time secret sharing.The self selection and self secret is to prevent the cheating of the trusted center.The secret share involved in the secret sharing is provided by the participants themselves.In the multi secret sharing,the participants do not have to open their own secret share and ensure the security.In this paper,two kinds of multi secret sharing schemes are given from the trusted center and the non trusted center,and the renewability and verifying are discussed.The main contents of this paper are as follows:Firstly,the research background and research significance of secret sharing are introduced,and the research status at home and abroad is analyzed.The second chapter introduces the mathematical knowledge used in secret sharing,including the knowledge of group theory and the knowledge of cryptography,which lays the foundation for the introduction of secret schemes.In the third chapter,three classical secret schemes are given,which are based on Lagrange interpolation and system grouped multi secret sharing scheme.In chapter four and five,two secret sharing schemes are introduced,which can realize multi secret sharing in one time sharing,and the security and correctness of the two schemes are also analyzed.The two schemes are also renewable and dynamic.That is to change the secret without changing the secret share.The two schemes can be dynamically added and withdrawn according to the actual application.
Keywords/Search Tags:information security, Secret sharing, Multi secret sharing, Renewability
PDF Full Text Request
Related items