Font Size: a A A

Secret Sharing Scheme Based On The Chinese Remainder Theorem In Cloud Computing

Posted on:2021-09-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y H YangFull Text:PDF
GTID:2518306314981759Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer network technology,the big data era has already entered our life,which has influenced all aspects of life.Through internet as a medium,information interaction among people has become more and more frequent.However,due to the diversification of information transmission methods,information security issue is becoming increasingly prominent.Secret sharing is one of the important means to improve information data security and data confidentiality.Secret sharing is an important part in modern cryptography,which provides a new way to solve the key management problem and improve the security of key’s storage,transmission and use.The main idea of the secret sharing is to divide the secrets that need to be shared into several shares in an appropriate way,and then the shares are managed by different participants,and the secret can’t be restored until no fewer than a specified number of participants cooperate with each other.This paper makes an in-depth studies on resisting external attackers and internal deceivers,the correctness of the secret reconstruction,and the practicality of the secret sharing scheme,combined with the Chinese Remainder Theorem,elliptic curve discrete logarithm problem,bilinear transformation and other tools.Through this study,several results have been discovered.First,a secret sharing scheme is designed based on the Chinese Remainder Theorem,which can verify the correctness of sub-secret shares.The proposed scheme proves that the sub-secret shares are verified by combining the elliptic curve discrete logarithm problem with bilinear pair technique,so as to reduce the information quantity of the system and operation cost.Second,the secret sharing scheme is applied to the Cloud services store information scenarios and the concrete examples are given to illustrate the practicability of the scheme.In the view of the current phenomenon that untrusted cloud computing service providers may steal private data stored by users in the internet,the secret sharing technology is applied to the cloud computing environment.Finally,at the end of this paper,the relevant research work is summarized and then the future research direction is prospected.
Keywords/Search Tags:secret sharing, verifiable, Chinese Remainder Theorem, elliptic curve discrete logarithm problem, cloud computing
PDF Full Text Request
Related items