网络与信息安全学报 ›› 2019, Vol. 5 ›› Issue (1): 22-29.doi: 10.11959/j.issn.2096-109x.2019003

• 专栏:密码攻防技术研究及应用探索 • 上一篇    下一篇

基于二元非对称多项式的公平秘密共享方案

杨文伟,邢玉清   

  1. 信息工程大学,河南 郑州450001
  • 修回日期:2019-01-04 出版日期:2019-02-01 发布日期:2019-04-10
  • 作者简介:杨文伟(1985- ),男,江苏盐城人,信息工程大学博士生,主要研究方向为网络安全、密码学、博弈论。|邢玉清(1981- ),男,河南周口人,信息工程大学博士生,主要研究方向为网络安全、密码学、智能算法。
  • 基金资助:
    国家重点研发计划基金资助项目(2016YFB0801601);国家重点研发计划基金资助项目(2016YFB0801505)

Fair secret sharing scheme using asymmetric bivariate polynomial

Wenwei YANG,Yuqing XING   

  1. Information Engineering University,Zhengzhou 450001,China
  • Revised:2019-01-04 Online:2019-02-01 Published:2019-04-10
  • Supported by:
    The National Key R&D Plan Program of China(2016YFB0801601);The National Key R&D Plan Program of China(2016YFB0801505)

摘要:

在Shamir的(t,n)秘密共享方案中,任何m(m≥t)个参与者可以重建秘密,而任何少于t个的参与者无法得到秘密的任何信息。然而,如果在秘密重建阶段有超过t个参与者进行重构时,Shamir的秘密重建阶段不能阻止外部攻击者知道秘密,而内部攻击者在秘密重构过程中可以提交虚假份额欺骗诚实参与者。提出一个基于非对称二元多项式的具有未知重构轮数的秘密共享方案,并针对4种攻击模型(同步非合谋攻击、异步非合谋攻击、同步合谋攻击及异步合谋攻击)证明方案具有防范外部攻击者和内部攻击者的安全性与公平性。

关键词: 秘密共享, 非对称二元多项式, 公平性, 攻击模式

Abstract:

In Shamir's (t,n) secret sharing scheme,any m (m≥t) participants can reconstruct the secret,and any less than t participants can't get any information about the secret.However,if there are more than t participants in the secret reconstruction phase,Shamir's secret reconstruction phase can not prevent external attackers from knowing the secret,while internal attackers can release a fake share to deceive honest participants during the secret reconstruction process.A rational threshold secret sharing scheme using asymmetric bivariate polynomial with unknown rounds is proposed.Then it shows its fairness and security against non-cooperative attack with synchronization,non-cooperative attack with a synchronization,cooperative attack with synchronization and cooperative attack with a synchronization.

Key words: threshold secret sharing, asymmetric bivariate polynomial, fairness, attack model

中图分类号: 

No Suggested Reading articles found!