电信科学 ›› 2015, Vol. 31 ›› Issue (11): 23-29.doi: 10.11959/j.issn.1000-0801.2015251

• 研究与开发 • 上一篇    下一篇

一种基于二进制序列的秘密共享新方法

程叶霞1,2,杜跃进1,3,杨凯2,何申2,彭晋2,姜文4   

  1. 1 中国科学院信息工程研究所 北京 100093
    2 中国移动通信研究院安全技术研究所 北京 100053
    3 阿里巴巴集团安全部 北京 100102
    4 国家计算机网络应急技术处理协调中心 北京 100029
  • 出版日期:2015-11-20 发布日期:2015-12-14
  • 基金资助:
    国家自然科学基金资助项目;国家高技术研究发展计划(“863”计划)基金资助项目;国家发展和改革委员会信息化领域创新能力建设专项(网络安全应急技术国家工程实验室项目)资助项目

A Novel Secret Sharing Method Based on Binary Sequence

Yexia Cheng1,2,Yuejin Du1,3,Kai Yang2,Shen He2,Jin Peng2,Wen Jiang4   

  1. 1 Institute of Information Engineering,China Academy of Sciences,Beijing 100093,China
    2 Department of Security Technology,China Mobile Research Institute,Beijing 100053,China
    3 Security Department,Alibaba Group,Beijing 100102,China
    4 National Computer Network Emergency Response Technical Team/Coordination Center of China,Beijing 100029,China
  • Online:2015-11-20 Published:2015-12-14
  • Supported by:
    The National Natural Science Foundation of China;The National High Technology Research and Development Program of China(863 Program);The National Development and Reform Commission Innovation Capacity Building Project of Information Area Fund(NELCERT)

摘要:

提出了一种与传统的秘密共享方法不同的新型的秘密共享方法,该方法是基于二进制秘密序列的位运算的秘密共享方法。秘密包括但不限于密码、消息等,秘密序列包括但不限于密码序列、消息序列等,将采用非M序列法则法形成的非M序列作为其秘密共享的子秘密序列M’的构成元素。提出了基于二进制序列的秘密共享的子秘密生成方法及对应的秘密恢复方法,该方法具有可行性与实效性。

关键词: 秘密共享, 二进制序列, 非M序列, 门限方案, 秘密恢复, 信息安全

Abstract:

A novel secret sharing method was proposed based on binary sequence,which was quite different from the traditional secret sharing method.This secret sharing method was based on binary secret sequence using bit operations.The secret here included but not limited to key,message,etc,meanwhile the secret sequence included but not limited to key sequence,message sequence and so on.And two new concepts which were called non-M sequence and non-M sequence rule method were defined.By using the non-M sequence rule method,the elements of sub-secret sequence M' of secret sharing were computed.The method for generating sub-secrets and the method for recovering secret was proposed based on binary sequence.The method was practical and effective.

Key words: secret sharing, binary sequence, non-M sequence, threshold scheme, secret recovery, information security

No Suggested Reading articles found!