Font Size: a A A

Research On Verifiable Secret Sharing And Adaptive Bandwidth Schemes

Posted on:2021-01-21Degree:MasterType:Thesis
Country:ChinaCandidate:C W HuFull Text:PDF
GTID:2428330605468052Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Secret sharing is an encryption technology that divides and stores data.It is also an important means of information security and data confidentiality.Its purpose is to prevent excessive concentration of secret data,so as to achieve the effect of diversifying risks and tolerating intrusion.In recent years,the frequent disclosure of private data has made the protection of important private data more and more important.Therefore,the research on secret sharing strategy has important theoretical value and practical significance.Secret sharing has also become an important research branch in the field of cryptography and a research hotspot in the direction of information security.This paper describes the research background,significance and purpose of secret sharing in detail,focuses on the security and communication efficiency of secret sharing algorithms,and makes an in-depth analysis and discussion on the theory and application of the threshold secret sharing algorithm.The main research contents of this article are summarized as follows:1.The main research progress of verifiable secret sharing is systematically summarized,the verification effect of verifiable secret sharing on data validity is analyzed,several classical verifiable secret sharing schemes are introduced,and their performance is analyzed and discussed.At the same time,the elliptic curve algorithm is introduced into verifiable secret sharing,a more secure verifiable secret sharring scheme based on elliptic curve is proposed,and its security and effectiveness are proved and discussed.2.The communication cost of secret sharing in distributing and restoring secret data has always been the focus of scholars' research.It is very important to get the lower bound of the communication cost of secret sharing and find the optimal communication scheme that meets this lower bound.The lower bound of communication overhead for secret sharing is studied,and the lower bound is proved in detail.Then,the staircase code,which is the optimal secret sharing scheme for communication that reaches the lower bound of communication overhead,is introduced,and its performance is analyzed,and its main advantages and disadvantages are discussed.3.The impact on the communication cost of secret sharing is not limited to the secret sharing scheme itself.The bandwidth utilization of the scheme also has a greater impact on the communication overhead.An adaptive bandwidth secret sharing scheme is proposed.This scheme can make full use of the bandwidth under the imbalanced communication bandwidth condition,so that the communication efficient secret sharing scheme can further reduce the communication overhead and achieve higher communication rate under the same communication bandwidth.
Keywords/Search Tags:Secret sharing, distributed storage, publicly verifiable, communication overhead, adaptive bandwidth
PDF Full Text Request
Related items