• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Huang Dongping, Liu Duo, and Dai Yiqi. Weighted Threshold Secret Sharing[J]. Journal of Computer Research and Development, 2007, 44(8): 1378-1382.
Citation: Huang Dongping, Liu Duo, and Dai Yiqi. Weighted Threshold Secret Sharing[J]. Journal of Computer Research and Development, 2007, 44(8): 1378-1382.

Weighted Threshold Secret Sharing

More Information
  • Published Date: August 14, 2007
  • A weighted threshold secret sharing scheme based on modular computation is proposed in this paper. Weights are used to give differential influence to participants. When the sum of weights of the participants is as big as or bigger than the threshold value, they can recover the secret, otherwise they can not. The participants of the previous weighted secret sharing schemes based on decomposition structure have to hold several sub-secrets which have different application circumstances and are very difficult to manage. But the proposed scheme only requires each participant to hold one single sub-secret, which simplifies the management and usage of the sub-secrets, and enables this scheme applicable for the cases where the management convenience is more important. In some cases,the weights and the threshold value could be adjusted to reduce the size of the scheme but still with the same effect compared with the original one. For this purpose, the concept of the equivalence of access structures is suggested, and an algorithm for parameter adjustment based on integer programming is proposed to minimize the threshold.
  • Related Articles

    [1]Zhang Zelin, Wang Huaqun. Dynamic Key Management of Industrial Internet Based on Blockchain[J]. Journal of Computer Research and Development, 2023, 60(2): 386-397. DOI: 10.7544/issn1000-1239.202111095
    [2]Ma Chunguang, Wang Jiuru, Wu Peng, Zhang Hua. M-IBE Based Key Management Protocol for Heterogeneous Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(10): 2109-2116.
    [3]Cheng Fangquan, Peng Zhiyong, Song Wei, Wang Shulin, Cui Yihui. Key Management for Access Control in Trusted Cloud Storages[J]. Journal of Computer Research and Development, 2013, 50(8): 1613-1627.
    [4]Zhang Wenfang, Wang Xiaomin, He Dake. An Improved VCA Interaction Model for Virtual Enterprises Based on Threshold RSA Signature[J]. Journal of Computer Research and Development, 2012, 49(8): 1662-1667.
    [5]Zhang Liming, Ouyang Dantong, and Bai Hongtao. Theorem Proving Algorithm Based on Semi-Extension Rule[J]. Journal of Computer Research and Development, 2010, 47(9): 1522-1529.
    [6]Wang Gang, Wen Tao, Guo Quan, Ma Xuebin. An Efficient and Secure Group Key Management Scheme in Mobile Ad Hoc Networks[J]. Journal of Computer Research and Development, 2010, 47(5): 911-920.
    [7]Sun Jigui, Li Ying, Zhu Xingjun, and Lü Shuai. A Novel Theorem Proving Algorithm Based on Extension Rule[J]. Journal of Computer Research and Development, 2009, 46(1): 9-14.
    [8]Chen Haikun, Shi Shengfei, and Li Jianzhong. A Key Management Scheme Based on Variable Transmission Range in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 165-171.
    [9]Han Aili, Zhu Daming. DNA Computing Model Based on a New Scheme of Encoding Weight for Chinese Postman Problem[J]. Journal of Computer Research and Development, 2007, 44(6): 1053-1062.
    [10]He Yongzhong, Li Xiaofeng, Feng Dengguo. Implementing Chinese Wall Policies on RBAC[J]. Journal of Computer Research and Development, 2007, 44(4): 615-622.

Catalog

    Article views (821) PDF downloads (595) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return