高级检索
    郭渊博, 马建峰, 王亚弟. 一种基于图的攻击结构的高效秘密共享方案[J]. 计算机研究与发展, 2005, 42(5): 877-882.
    引用本文: 郭渊博, 马建峰, 王亚弟. 一种基于图的攻击结构的高效秘密共享方案[J]. 计算机研究与发展, 2005, 42(5): 877-882.
    Guo Yuanbo, Ma Jianfeng, Wang Yadi. An Efficient Secret Sharing Scheme Realizing Graph-Based Adversary Structures[J]. Journal of Computer Research and Development, 2005, 42(5): 877-882.
    Citation: Guo Yuanbo, Ma Jianfeng, Wang Yadi. An Efficient Secret Sharing Scheme Realizing Graph-Based Adversary Structures[J]. Journal of Computer Research and Development, 2005, 42(5): 877-882.

    一种基于图的攻击结构的高效秘密共享方案

    An Efficient Secret Sharing Scheme Realizing Graph-Based Adversary Structures

    • 摘要: 现有秘密共享方案大都是基于存取结构的,然而应用中一般难以根据系统配置直接确定存取结构.与此相反,系统可以容忍攻击者同时破坏的参与方情况,称之为攻击结构,则可根据 系统配置直接确定.设计了一种实现基于图的攻击结构的高效的秘密共享方案,并完整地证 明了该方案满足完善秘密共享所要求的秘密重构和完善保密特性.与现有的方案相比,该方 案在显著降低份额分配及秘密重构阶段所需计算量的同时不会增加系统的存储负载,因此具 有很高的计算性能和存储性能.

       

      Abstract: Most of the existing secret sharing schemes are constructed to realize general access structure, which is defined in term of authorized groups of participants, and is unable to be applied directly to the design of an intrusion tolerant syst em. Instead, the generalized adversary structure, which specifies the corruptibl e subsets of participants, can be determined directly by exploiting the system s etting and the attributes of all participants. An efficient secret sharing schem e realizing graph-based adversary structures is proposed. The scheme requires le ss computational costs and storage overhead than the existing ones. Furthermore, it is proved that the scheme satisfy both the required properties of the secret sharing scheme, i.e., the reconstruction property and the perfect property.

       

    /

    返回文章
    返回