Identity (ID)-based threshold multi-secret sharing scheme

被引:2
作者
Pang, Liao-Jun [1 ,2 ]
Pei, Qing-Qi [1 ]
Jiao, Li-Cheng [2 ]
Wang, Yu-Min [1 ]
机构
[1] Key Laboratory of Computer Network and Information Security, Xidian University
[2] Institute of Intelligent Information Processing, Xidian University
来源
Ruan Jian Xue Bao/Journal of Software | 2008年 / 19卷 / 10期
关键词
Forward secrecy; ID-based public key cryptosystem; Secret sharing; Signcryption;
D O I
10.3724/SP.J.1001.2008.02739
中图分类号
学科分类号
摘要
In order to avoid the flaw of the secret shadow distribution method in the existing secret sharing schemes, a secret shadow distribution method is proposed with the ID-based public key technology integrated, which uses the participant's private key as his master shadow. Firstly, security analyses are made on Zheng's signcryption scheme, which shows his scheme does not offer forward secrecy. Then, an improvement is made on Zheng's signcryption scheme and a new scheme is proposed. Based on the proposed signcryption scheme and the ID-based public key cryptosystem, a new threshold multi-secret sharing scheme is proposed. The problem of the secret shadow distribution is well resolved, and no information exchange is needed between the secret dealer and each participant in advance. The secret shadow distribution can be processed during the secret distribution. At the same time, the proposed scheme offers forward secrecy. That is to say, even if the private key of the secret dealer is exposed, the security of the shared secrets will not be threatened. Therefore, the proposed ID-based secret sharing scheme is more secure and effective than others, and it can be more applicable.
引用
收藏
页码:2739 / 2745
页数:6
相关论文
共 12 条
[1]  
Shamir A., How to share a secret, Communications of the ACM, 22, 11, pp. 612-613, (1979)
[2]  
Blakley G., Safeguarding cryptographic keys, Proc. of the American Federation of Information Processing Societies Conf. (AFIPS'79), pp. 313-317, (1979)
[3]  
Fei R.C., Wang L.N., Cheat-Proof secret share schemes based on RSA and one-way function, Journal of Software, 14, 1, pp. 146-150, (2003)
[4]  
Li H.X., Pang L.J., Cai W.D., An efficient threshold multi-group-secret sharing scheme, Proc. of the 2nd Int'l Conf. of Fuzzy Information and Engineering (ICFIE 2007), pp. 911-918, (2007)
[5]  
Pang L.J., Wang Y.M., (t, n) threshold secret sharing scheme based on RSA cryptosystem, Journal of Communications, 26, 6, pp. 70-73, (2005)
[6]  
Hwang R.J., Chang C.C., An on-line secret sharing scheme for multi-secrets, Computer Communications, 21, 13, pp. 1170-1176, (1998)
[7]  
Zhu Y., Yang Y.T., Sun Z.W., Feng D.G., Ownership proofs of digital works based on secure multiparty computation, Journal of Software, 17, 1, pp. 157-166, (2006)
[8]  
Hwang R.J., Lai C.H., Su F.F., An efficient signcryption scheme with forward secrecy based on elliptic curve, Applied Mathematics and Computation, 167, 1, pp. 870-881, (2005)
[9]  
Zheng Y., Digital signcryption or how to achieve cost (signature and encryption)<<cost(signature)+cost(encryption), Kaliski B, ed. Proc. of the Advances in Cryptology (CRYPTO'97), pp. 165-179, (1997)
[10]  
Shamir A., Identity-Based cryptosystems and signature schemes, Proc. of the Advances in Cryptology (CRYPTO'84), pp. 47-53, (1984)