基本信息来源于合作网站,原文需代理用户跳转至来源网站获取       
摘要:
In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well.
推荐文章
Application ontology构建及SPARQL查询研究
本体
手机应用
简单协议和RDF查询语言
查询
本体描述语言
香菇菌株ITS序列分子检测
香菇
菌株
ITS5.8srDNA
特异引物
石榴种质资源ITS序列分析
石榴
ITS序列
系统进化树
Elemental characteristics and paleoenvironment reconstruction: a case study of the Triassic lacustri
Trace elements
Occurrence mode
Paleoenvironment
Zhangjiatan oil shale
Yanchang Formation
Ordos Basin
内容分析
关键词云
关键词热度
相关文献总数  
(/次)
(/年)
文献信息
篇名 Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography
来源期刊 通讯、网络与系统学国际期刊(英文) 学科 医学
关键词 Shamir’s(t n)Secret Sharing Scheme SECRET RECONSTRUCTION THRESHOLD CRYPTOGRAPHY THRESHOLD DECRYPTION ASYNCHRONOUS Networks
年,卷(期) 2014,(1) 所属期刊栏目
研究方向 页码范围 22-29
页数 8页 分类号 R73
字数 语种
DOI
五维指标
传播情况
(/次)
(/年)
引文网络
引文网络
二级参考文献  (0)
共引文献  (0)
参考文献  (0)
节点文献
引证文献  (0)
同被引文献  (0)
二级引证文献  (0)
2014(0)
  • 参考文献(0)
  • 二级参考文献(0)
  • 引证文献(0)
  • 二级引证文献(0)
研究主题发展历程
节点文献
Shamir’s(t
n)Secret
Sharing
Scheme
SECRET
RECONSTRUCTION
THRESHOLD
CRYPTOGRAPHY
THRESHOLD
DECRYPTION
ASYNCHRONOUS
Networks
研究起点
研究来源
研究分支
研究去脉
引文网络交叉学科
相关学者/机构
期刊影响力
通讯、网络与系统学国际期刊(英文)
月刊
1913-3715
武汉市江夏区汤逊湖北路38号光谷总部空间
出版文献量(篇)
763
总下载数(次)
1
总被引数(次)
0
  • 期刊分类
  • 期刊(年)
  • 期刊(期)
  • 期刊推荐
论文1v1指导