{"title":"一种基于ECC的矢量空间密钥共享方案","authors":"","doi":"10.1109/SPCA.2006.297448","DOIUrl":null,"url":null,"abstract":"In this article, a verifiable vector space secret sharing scheme is proposed in detail. It's security is based on the security of elliptic curve cryptography. This scheme has the following characteristics: The precondition of (t ,n) -threshold secret sharing scheme that all assignees' purview must be same is generalized. A verifiable infrastructure is provided, which can be used to detect the cheaters from dealer and assignees. The shared key distributed by dealer is encrypted based on elliptic curve cryptography, which enhances the security. Meanwhile the length of key of elliptic curve cryptography is much less than RSA cryptography, so the current scheme is of less computation cost and communication cost which is valuable in applications with limited memory, communication bandwidth or computing power","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"An ECC based vector space key sharing scheme\",\"authors\":\"\",\"doi\":\"10.1109/SPCA.2006.297448\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this article, a verifiable vector space secret sharing scheme is proposed in detail. It's security is based on the security of elliptic curve cryptography. This scheme has the following characteristics: The precondition of (t ,n) -threshold secret sharing scheme that all assignees' purview must be same is generalized. A verifiable infrastructure is provided, which can be used to detect the cheaters from dealer and assignees. The shared key distributed by dealer is encrypted based on elliptic curve cryptography, which enhances the security. Meanwhile the length of key of elliptic curve cryptography is much less than RSA cryptography, so the current scheme is of less computation cost and communication cost which is valuable in applications with limited memory, communication bandwidth or computing power\",\"PeriodicalId\":232800,\"journal\":{\"name\":\"2006 First International Symposium on Pervasive Computing and Applications\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 First International Symposium on Pervasive Computing and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SPCA.2006.297448\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 First International Symposium on Pervasive Computing and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPCA.2006.297448","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this article, a verifiable vector space secret sharing scheme is proposed in detail. It's security is based on the security of elliptic curve cryptography. This scheme has the following characteristics: The precondition of (t ,n) -threshold secret sharing scheme that all assignees' purview must be same is generalized. A verifiable infrastructure is provided, which can be used to detect the cheaters from dealer and assignees. The shared key distributed by dealer is encrypted based on elliptic curve cryptography, which enhances the security. Meanwhile the length of key of elliptic curve cryptography is much less than RSA cryptography, so the current scheme is of less computation cost and communication cost which is valuable in applications with limited memory, communication bandwidth or computing power