基于CRT和RSA的指定参与者的门限秘密共享方案
Threshold Secret Sharing Scheme with Designated Participants Based on CRT and RSA
DOI: 10.12677/aam.2024.1312499, PDF,    科研立项经费支持
作者: 陈宇臻, 林昌露*:福建师范大学数学与统计学院,福建 福州;黄可可:福建师范大学计算机与网络空间安全学院,福建 福州
关键词: 门限秘密共享指定参与者中国剩余定理RSAThreshold Secret Sharing Designated Participants Chinese Remainder Theorem RSA
摘要: 针对医院间共享数据的实际需求,本文基于中国剩余定理结合RSA公钥加密分别设计了指定一个参与者和指定多个参与者的门限秘密共享方案,以实现医疗数据的安全共享。在秘密分发阶段,指定参与者可自主选择秘密份额,且无需在分发者与参与者之间建立安全信道;在秘密重构阶段,必须有特定的参与者参与才能成功恢复原始秘密。对方案的安全性与性能分析表明,所提出方案在效率和安全性上均优于现有方案。
Abstract: In order to meet the practical needs of sharing data between hospitals, this paper proposes a threshold secret sharing scheme for designating one participant and designating multiple participants based on the Chinese remainder theorem combined with RSA public key encryption, so as to realize the secure sharing of medical data. In the secret distribution phase, the designated participants can choose their own secret shares, and there is no need to establish a secure channel between the distributor and the participants; in the secret reconstruction phase, a designated participant must be involved in order to successfully recover the original secret. The analysis of the security and performance of the scheme shows that the proposed scheme is better than the existing scheme in terms of efficiency and security.
文章引用:陈宇臻, 黄可可, 林昌露. 基于CRT和RSA的指定参与者的门限秘密共享方案[J]. 应用数学进展, 2024, 13(12): 5164-5173. https://doi.org/10.12677/aam.2024.1312499

参考文献

[1] Shamir, A. (1979) How to Share a Secret. Communications of the ACM, 22, 612-613. [Google Scholar] [CrossRef
[2] Blakley, G.R. (1979) Safeguarding Cryptographic Keys. 1979 International Workshop on Managing Requirements Knowledge (MARK), New York, 4-7 June 1979, 313-318. [Google Scholar] [CrossRef
[3] Chor, B., Goldwasser, S., Micali, S. and Awerbuch, B. (1985) Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. 26th Annual Symposium on Foundations of Computer Science (SFCS 1985), Portland, 21-23 October 1985, 383-395. [Google Scholar] [CrossRef
[4] Feldman, P. (1987) A Practical Scheme for Non-Interactive Verifiable Secret Sharing. 28th Annual Symposium on Foundations of Computer Science (SFCS 1987), Los Angeles, 12-14 October 1987, 427-438. [Google Scholar] [CrossRef
[5] Asmuth, C. and Bloom, J. (1983) A Modular Approach to Key Safeguarding. IEEE Transactions on Information Theory, 29, 208-210. [Google Scholar] [CrossRef
[6] Iftene, S. (2007) Secret Sharing Schemes with Applications in Security Protocols, Technical Report. University Alexandru Ioan Cuza of Iasi, Faculty of Computer Science.
[7] Li, Q., Wang, Z.F. and Niu, X.M. (2005) A Non-Interactive Modular Verifiable Secret Sharing Scheme. 2005 Proceedings on Communications, Circuits and Systems, Hong Kong, 27-30 May 2005, 84-87.
[8] Harn, L. and Lin, C. (2010) Strong (n, t, n) Verifiable Secret Sharing Scheme. Information Sciences, 180, 3059-3064. [Google Scholar] [CrossRef
[9] 唐韶华. 特殊门限秘密共享方法及其应用[J]. 华南理工大学学报(自然科学版), 2007(10): 168-171+177.
[10] Subba, R.Y.V. and Bhagvati, C. (2014) CRT Based Threshold Multi Secret Sharing Scheme. International Journal of Network Security, 16, 249-255.
[11] Harn, L. and Miao, F.Y. (2013) Weighted Secret Sharing Based on the Chinese Remainder Theorem. International Journal of Network Security, 2013, 420-425.
[12] Harn, L. and Fuyou, M. (2014) Multilevel Threshold Secret Sharing Based on the Chinese Remainder Theorem. Information Processing Letters, 114, 504-509. [Google Scholar] [CrossRef
[13] Dong, X.D. (2015) A Multi-Secret Sharing Scheme Based on the CRT and RSA. International Journal of Electronics and Information Engineering, 2, 47-51.
[14] Ning, Y., Miao, F., Huang, W., Meng, K., Xiong, Y. and Wang, X. (2018) Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder Theorem. In: Lecture Notes in Computer Science, Springer 310-331. [Google Scholar] [CrossRef
[15] Wu, L., Miao, F., Meng, K. and Wang, X. (2021) A Simple Construction of CRT-Based Ideal Secret Sharing Scheme and Its Security Extension Based on Common Factor. Frontiers of Computer Science, 16, 1-9. [Google Scholar] [CrossRef
[16] Vorisek, C.N., Lehne, M., Klopfenstein, S.A.I., Mayer, P.J., Bartschke, A., Haese, T., et al. (2022) Fast Healthcare Interoperability Resources (FHIR) for Interoperability in Health Research: Systematic Review. JMIR Medical Informatics, 10, e35724. [Google Scholar] [CrossRef] [PubMed]
[17] Yang, C., Li, P., Cheng, H., Kuo, H., Lu, M. and Xiong, L. (2024) A Security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain. IEEE Internet of Things Journal, 11, 10325-10335. [Google Scholar] [CrossRef
[18] Cohen, H. (2013) A Course in Computational Algebraic Number Theory. Springer Science & Business Media.