没有可信方的主动秘密共享

Xiuqun Wang, Changlu Lin, Yong Li
{"title":"没有可信方的主动秘密共享","authors":"Xiuqun Wang, Changlu Lin, Yong Li","doi":"10.1109/INCoS.2013.96","DOIUrl":null,"url":null,"abstract":"A (t + 1, n) proactive secret sharing is to protect a secret in long-lived system by distributing it to a group of n participants and refreshing their shares periodically in this fixed group, while any t + 1 and more than t + 1 shares can reconstruct the secret. In this paper, we propose a proactive secret sharing scheme without a trusted party, who generates and distributes shares among the participants. Our scheme is uniformly efficient and tolerates t Byzantine faults in any single time interval, where the number of participants n>=3t + 1. We also prove that the proposed scheme is secure under the discrete logarithm intractability assumption.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Proactive Secret Sharing without a Trusted Party\",\"authors\":\"Xiuqun Wang, Changlu Lin, Yong Li\",\"doi\":\"10.1109/INCoS.2013.96\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A (t + 1, n) proactive secret sharing is to protect a secret in long-lived system by distributing it to a group of n participants and refreshing their shares periodically in this fixed group, while any t + 1 and more than t + 1 shares can reconstruct the secret. In this paper, we propose a proactive secret sharing scheme without a trusted party, who generates and distributes shares among the participants. Our scheme is uniformly efficient and tolerates t Byzantine faults in any single time interval, where the number of participants n>=3t + 1. We also prove that the proposed scheme is secure under the discrete logarithm intractability assumption.\",\"PeriodicalId\":353706,\"journal\":{\"name\":\"2013 5th International Conference on Intelligent Networking and Collaborative Systems\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 5th International Conference on Intelligent Networking and Collaborative Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INCoS.2013.96\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCoS.2013.96","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

(t + 1, n)主动秘密共享是通过将秘密分配给n个参与者的组,并定期刷新他们在该固定组中的份额来保护长寿命系统中的秘密,而任何t + 1和t + 1以上的共享都可以重构该秘密。在本文中,我们提出了一种没有可信方的主动秘密共享方案,由可信方在参与者之间生成和分配股份。我们的方案是一致有效的,并且在任何单个时间间隔内容忍t个拜占庭错误,其中参与者的数量n>=3t + 1。在离散对数难处理假设下,证明了该方案的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Proactive Secret Sharing without a Trusted Party
A (t + 1, n) proactive secret sharing is to protect a secret in long-lived system by distributing it to a group of n participants and refreshing their shares periodically in this fixed group, while any t + 1 and more than t + 1 shares can reconstruct the secret. In this paper, we propose a proactive secret sharing scheme without a trusted party, who generates and distributes shares among the participants. Our scheme is uniformly efficient and tolerates t Byzantine faults in any single time interval, where the number of participants n>=3t + 1. We also prove that the proposed scheme is secure under the discrete logarithm intractability assumption.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信