Font Size: a A A

A Publicly Verifiable Threshold Multiple Secrets Sharing Scheme

Posted on:2020-03-25Degree:MasterType:Thesis
Country:ChinaCandidate:Z Z CaiFull Text:PDF
GTID:2428330599956694Subject:Computational Mathematics
Abstract/Summary:PDF Full Text Request
In the process of confidential communication,in order to ensure the security of information,the information needs to be encrypted,and the core of encryption is the secret key,so the storage and management of the key directly affect the security of the communication system.Therefore,the storage and management of secret keys has become one of the important topics in cryptography.Secret sharing provides an effective solution for the storage and management of secret keys,and secret sharing has been widely used in many fields.This paper focuses on the theory of secret sharing.Firstly,the research background,purpose and significance of secret sharing are briefly introduced.Secondly,the research status of secret sharing is summarized,and several common secret sharing schemes are introduced.On this basis,a secure and effective(,9))multiple secret sharing threshold scheme is designed.A bulletin board is needed in the system of this scheme,only the Dealer can modify and update the data on it,and participants can only download or browse.The characteristic of this scheme is that the secret share distributed to the Dealer can be publicly verified,but only the designated participant can decrypt and get the sub-secret,and the sub-secret can be reused.The decryption share provided by the participant can also be publicly verified,both of which are non-interactive,efficient and convenient,which can effectively prevent the Dealer from cheating and the Dealer from cheating.The encryption scheme adopts the ElGamal public key cryptosystem,and the calculated verification parameters can be used for many times.To share new secrets,the Dealer only needs to release new data on the bulletin board.The calculation amount of the Dealer is small,which has wide applicability.Finally,summarize the paper and the prospect of the work to be done.
Keywords/Search Tags:secret sharing, threshold scheme, lagrange coefficient, confidential communications, key management
PDF Full Text Request
Related items