N个Shamir门限秘密共享方案组合的通用可验证性设计
Universal Verifiability Design for the Combination of N Shamir Threshold Secret Sharing Schemes
DOI: 10.12677/CSA.2019.912263, PDF,  被引量    国家自然科学基金支持
作者: 郭涌浩*, 卫宏儒:北京科技大学数理学院,北京
关键词: 秘密分享方案可验证性安全多方计算Shamir门限Secret Sharing Verifiability Secure Multiparty Computing Shamir Threshold
摘要: 秘密共享方案的可验证性是安全多方计算协议中重要的一个研究方向,该领域的研究可以作为安全计算的公平性、安全性、正确性研究基础。本文设计了一种n个Shamir门限秘密共享方案组合的通用可验证性,该方案与已有的Shamir门限秘密共享方案不同,本文将每个参与者分享的秘密数扩展到个,即个Shamir门限的组合,而不是单单的对于一个秘密的分享,使其应用的方面更加广泛;同时,弥补了现有通用方法在输入阶段和计算阶段的验证性的不足,最后实现了每个阶段、每个步骤可验证性的连续性、传递性。
Abstract: The verifiability of secret sharing scheme is an important research direction in secure multi-party computing protocols. The research in this field can be used as the basis for the fairness, security and correctness of security computing. This paper designed that a universal verifiability of a n-shamir threshold secret sharing scheme is different from the existing shamir threshold secret sharing scheme. This paper extends the secret number shared by each participant to n, i.e. the combination of n-shamir thresholds, rather than a single secret sharing, makes its application more extensive; at the same time, it makes up for the lack of verification of the existing general methods in the input phase and the computing phase. Finally, the continuity and transitivity of the verifiability of each stage and every step are achieved.
文章引用:郭涌浩, 卫宏儒. N个Shamir门限秘密共享方案组合的通用可验证性设计[J]. 计算机科学与应用, 2019, 9(12): 2367-2374. https://doi.org/10.12677/CSA.2019.912263

参考文献

[1] Blakley, G.R. (1979) Safeguarding Cryptographic Keys. Proceedings of AFIPS National Computer Conference, Wash-ington DC, 4-7 June 1979, 313-317. [Google Scholar] [CrossRef
[2] Shamir, A. (1979) How to Share a Secret. Communications of the ACM, 22, 612-613. [Google Scholar] [CrossRef
[3] Tompa, M. and Woll, H. (1988) How to Share a Secret with Cheaters. Journal of Cryptology, 1, 133-138. [Google Scholar] [CrossRef
[4] McEliece, R.J. and Sarwate, D.V. (1981) On Sharing Secrets and Reed-Solomon Codes. Communications of the ACM, 24, 583-584. [Google Scholar] [CrossRef
[5] 蒋华, 张乐乾, 阮玲玲. 基于公钥密码体质的802.1x双向认证研究[J]. 计算机应用于软件, 2016, 33(2): 290-293.
[6] 张柄虹, 张串绒, 焦和平, 张欣威, 高胜国. 一种基于双线性对的公平可验证多秘密共享方案[J]. 空军工程大学学报(自然科学版), 2014, 15(4): 83-87.
[7] 谷婷. 无可信中心可验证可更新的向量空间秘密共享[J]. 科技与创新, 2018, 99(3): 35-39.
[8] Chor, B., Goldwasser, S., Micali, S. and Awerbuch, B. (1985) Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. Proceeding 26th Annual Symposium on the Foun-dations of Computer Science, Portland, 21-23 October 1985, 383-395. [Google Scholar] [CrossRef
[9] Gennaro, R. and Rabin, M.O. (1998) Simplified VSS and Fast-Track Multiparty Computations with Applications to Threshold Cryptography. Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, Puerto Vallarta, 28 June-2 July 1998, 101-111. [Google Scholar] [CrossRef
[10] Qiu, G., Wang, H., Wei S.M. and Xiao, G.Z. (2006) Infor-mation-Theoretic Secure Verifiable Secret Sharing over RSA Modulus. Wuhan University Journal of Natural Sciences, 11, 1849-1852. [Google Scholar] [CrossRef
[11] Andrychowicz, M., Dziembowski, S., Malinowski, D., et al. (2014) Secure Multiparty Computations on Bitcoin. Proc of IEEE Symposium on Security and Privacy, San Jose, 18-21 May 2014, 76-84. [Google Scholar] [CrossRef