通信学报 ›› 2015, Vol. 36 ›› Issue (3): 265-274.doi: 10.11959/j.issn.1000-436x.2015083

• 学术论文 • 上一篇    下一篇

基于Shamir秘密共享的密钥分发与恢复算法

荣辉桂1,莫进侠1,常炳国1,孙光2,龙飞3   

  1. 1 湖南大学 信息科学与工程学院,湖南 长沙 410082
    2 湖南财政经济学院 信息管理系,湖南 长沙 410205
    3 长沙大学 经济管理系,湖南 长沙 410003
  • 出版日期:2015-03-25 发布日期:2017-06-21
  • 基金资助:
    国家自然科学基金资助项目;国家科技支撑计划基金资助项目;科技部创新基金资助项目;湖南重点建设学科基金资助项目;湖南大学“青年教师成长计划”基金资助项目

Key distribution and recovery algorithm based on Shamir's secret sharing

Hui-gui RONG1,Jin-xia MO1,Bing-guo CHANG1,Guang SUN2,Fei LONG3   

  1. 1 College of Computer Science and Engineering, Hunan University, Changsha 410082, China
    2 Department of Information Management, Hunan University of Finance and Economics, Changsha 410205, China
    3 Department of Economics and Management, Changsha University, Changsha 410003, China
  • Online:2015-03-25 Published:2017-06-21
  • Supported by:
    The National Natural Science Foundation of China;The National Key Technology Support Program;The Innovation Foundation of Science and Technology Ministry;The Construct Program of the Key Discipline in Hunan; The Young Teachers Development Plan of Hunan University

摘要:

在经典的Shamir秘密共享方案中,秘密分发者把秘密s分为n个影子秘密并分发给持有者;其中任意不少于t个影子秘密均能恢复秘密s,少于t个影子秘密则得不到秘密s的任何信息。现实的秘密恢复过程中可能存在超过t个参与者的情形。因此,在Shamir的秘密共享方案基础上讨论此种情形下秘密共享问题,通过引入影子秘密的线性组合——拉格朗日因子来恢复秘密,并进一步将其扩展为一个多秘密共享方案。理论分析与仿真实验表明:改进算法在同样复杂度条件下既保证影子秘密的安全,又能阻止欺骗者得到秘密,提高了整体安全性。

关键词: 秘密共享, 密钥分发, 拉格朗日因子, 密钥恢复

Abstract:

In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about the secret s. During the actual secret recovery process, there exist other cases with more than t par-ticipants. The case of secret sharing problem was discussed based on Shamir's secret sharing scheme and reconstructs the secret by introducing a linear combination of shadows—Lagrange factor. Then, the improved algorithm of key distribu-tion and recovery was proposed and extended to a multi-secret sharing scheme. Theoretical analysis and simulation show that the improved scheme improves its security under the same conditions of complexity.

Key words: secret sharing, key distribution, Lagrange factor, key recovery

No Suggested Reading articles found!