A finite equivalence of multisecret sharing based on Lagrange interpolating polynomial

被引:7
作者
Zhao, Hui [1 ]
Sun, Jonathan Z. [2 ]
Wang, Fengying [1 ]
Zhao, Lei [1 ]
机构
[1] Shandong Univ Technol, Sch Comp Sci & Technol, Zibo 255000, Peoples R China
[2] Univ So Mississippi, Sch Comp, Hattiesburg, MS 39406 USA
关键词
pi-calculus; secret sharing; formal analysis; protocol verifier;
D O I
10.1002/sec.694
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We give an abstraction of multisecret sharing based on Lagrange interpolating polynomial that is accessible to a fully mechanized analysis. This abstraction is formalized in the applied pi-calculus by using an equational theory that characterizes the cryptographic semantics of multisecret sharing based on Lagrange interpolating polynomial. We also present an encoding from the equational theory into a convergent rewriting system, which is suitable for the automated protocol verifier ProVerif. Finally, we verify the Yang-Chang-Hwang (YCH) protocol in ProVerif. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:1169 / 1175
页数:7
相关论文
共 17 条
[1]   A calculus for cryptographic protocols: The spi calculus [J].
Abadi, M ;
Gordon, AD .
INFORMATION AND COMPUTATION, 1999, 148 (01) :1-70
[2]   Secrecy by typing in security protocols [J].
Abadi, M .
JOURNAL OF THE ACM, 1999, 46 (05) :749-786
[3]   Mobile values, new names, and secure communication [J].
Abadi, M ;
Fournet, C .
ACM SIGPLAN NOTICES, 2001, 36 (03) :104-115
[4]   Just fast keying in the Pi calculus [J].
Abadi, Martin ;
Blanchet, Bruno ;
Fournet, Cedric .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (03)
[5]  
Bachmair L., 1994, Journal of Logic and Computation, V4, P217, DOI 10.1093/logcom/4.3.217
[6]  
BACKES M, 2007, P 5 ACM WORKSH FORM, P101
[7]   An efficient cryptographic protocol verifier based on prolog rules [J].
Blanchet, B .
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, :82-96
[8]  
Chien HY, 2000, IEICE T FUND ELECTR, VE83A, P2762
[9]  
Feldman Paul., 1987, A Practical Scheme for Non-interactive Verifiable Secret Sharing Paul Feldman, P427
[10]   MULTISTAGE SECRET SHARING BASED ON ONE-WAY FUNCTION [J].
HE, J ;
DAWSON, E .
ELECTRONICS LETTERS, 1994, 30 (19) :1591-1592