• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Pang Liaojun, Jiang Zhengtao, and Wang Yumin. A Multi-Secret Sharing Scheme Based on the General Access Structure[J]. Journal of Computer Research and Development, 2006, 43(1): 33-38.
Citation: Pang Liaojun, Jiang Zhengtao, and Wang Yumin. A Multi-Secret Sharing Scheme Based on the General Access Structure[J]. Journal of Computer Research and Development, 2006, 43(1): 33-38.

A Multi-Secret Sharing Scheme Based on the General Access Structure

More Information
  • Published Date: January 14, 2006
  • Based on Shamir's threshold scheme and the RSA cryptosystem, a new secret sharing scheme for the general access structure is proposed in this paper. In this scheme, each participant's secret shadow is selected by the participant himself and the dealer need not deliver any secret information to each participant, and thus a secure channel between them is unnecessary. The shadows do not need to be changed when the shared secret is renewed, the access structure is altered, or old participants are deleted/new participants are added. All these shadows are shorter than or as short as the shared secret. Each participant shares many secrets with other participants by holding only one shadow, and in the recovery phase each participant is allowed to check whether another participant provides the true information or not. The security of this scheme is the same as that of Shamir's threshold scheme and the RSA cryptosystem. Analyses show that this scheme is a computationally secure and efficient scheme.
  • Related Articles

    [1]Wang Xianghai, Zhang Wenya, Xing Junyu, Lü Fang, Mu Zhenhua. High-order Caputo Fractional Order Differential Operator and Its Application in Image Enhancement[J]. Journal of Computer Research and Development, 2023, 60(2): 448-464. DOI: 10.7544/issn1000-1239.202110942
    [2]Liu Yanxiao, Wu Ping, Sun Qindong. Secret Image Sharing Schemes Based on Region Convolution Neural Network[J]. Journal of Computer Research and Development, 2021, 58(5): 1065-1074. DOI: 10.7544/issn1000-1239.2021.20200898
    [3]Ren Weixiang, Zhai Liming, Wang Lina, Jia Ju. Reference Image Generation Algorithm for JPEG Image Steganalysis Based on Convolutional Neural Network[J]. Journal of Computer Research and Development, 2019, 56(10): 2250-2261. DOI: 10.7544/issn1000-1239.2019.20190386
    [4]Wang Yilei, Zhuo Yifan, Wu Yingjie, Chen Mingqin. Question Answering Algorithm on Image Fragmentation Information Based on Deep Neural Network[J]. Journal of Computer Research and Development, 2018, 55(12): 2600-2610. DOI: 10.7544/issn1000-1239.2018.20180606
    [5]Zhou Yucong, Liu Yi, Wang Rui. Training Deep Neural Networks for Image Applications with Noisy Labels by Complementary Learning[J]. Journal of Computer Research and Development, 2017, 54(12): 2649-2659. DOI: 10.7544/issn1000-1239.2017.20170637
    [6]Shen Huanghui, Wang Zhensong, Zheng Weimin. An Efficient Memory Access Strategy for Transposition and Block Operation in Image Processing[J]. Journal of Computer Research and Development, 2013, 50(1): 188-196.
    [7]Ye Jianhong, Song Wen, Sun Shixin. Operating and Analyzing the Reproducibility of Empty Marking Nets[J]. Journal of Computer Research and Development, 2009, 46(8): 1378-1385.
    [8]Bai Chenggang, Su Liang, Zhao Yingchun, Guo Junhong, and Cai Kaiyuan. Is the Reliability of Web Services Related to the Change Rate of Operational Profiles[J]. Journal of Computer Research and Development, 2008, 45(12): 2044-2051.
    [9]Zheng Qingfang, Gao Wen. Adaptive Skin Detection in JPEG Compressed Images[J]. Journal of Computer Research and Development, 2006, 43(7): 1194-1200.
    [10]Bao Fumin, Li Aiguo, Qin Zheng. Image Fusion Using SGNN[J]. Journal of Computer Research and Development, 2005, 42(3).

Catalog

    Article views (792) PDF downloads (622) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return