计算机应用 ›› 2016, Vol. 36 ›› Issue (4): 952-955.DOI: 10.11772/j.issn.1001-9081.2016.04.0952

• 网络空间安全 • 上一篇    下一篇

基于Birkhoff插值的可验证多等级秘密共享算法

许晓洁1,2, 王力生1   

  1. 1. 同济大学 电子与信息工程学院, 上海 201804;
    2. 上海师范大学 天华学院, 上海 201815
  • 收稿日期:2015-09-02 修回日期:2015-10-30 出版日期:2016-04-10 发布日期:2016-04-08
  • 通讯作者: 许晓洁
  • 作者简介:许晓洁(1982-),男,讲师,博士,主要研究方向:计算机体系结构、嵌入式系统、信息安全、可信计算; 王力生(1957-),男,教授,博士生导师,主要研究方向:计算机体系结构、嵌入式系统、可信计算、多线程并行计算。
  • 基金资助:
    国家863计划项目(2013AA040302);上海经信委重大技术装备研制专项(ZB-ZBYZ-03-12-1067-1,沪CXY-2014-006)。

Birkhoff interpolation-based verifiable hierarchical threshold secret sharing algorithm

XU Xiaojie1,2, WANG Lisheng1   

  1. 1. College of Electronics and Information Engineering, Tongji University, Shanghai 201804, China;
    2. Tianhua College, Shanghai Normal University, Shanghai 201815, China
  • Received:2015-09-02 Revised:2015-10-30 Online:2016-04-10 Published:2016-04-08
  • Supported by:
    This work is partially supported by the National High Technology Research and Development Program (863 Program) of China (2013AA040302), 2014 Shanghai Economic and Information Commission Project (ZB-ZBYZ-03-12-1067-1).

摘要: 分布式密钥生成(DKG)协议是分布式加密系统的重要组成部分,其允许一群参与者共同产生私钥和公钥,但只有授权的参与者子集才能重构私钥。然而,现有的基于DKG协议均是假定参与者等级相同。为此,提出基于Birkhoff插值的可验证多等级秘密共享BI-VHTSS算法。BI-VHTSS算法考虑了DKG问题,并由等级门限访问结构定义授权子集。利用Birkhoff插值和离数对数问题,验证了BI-VHTSS算法的正确性和安全性。

关键词: 可验证, 多等级, Birkhoff插值, 门限秘密共享

Abstract: A Distributed Key Generation (DKG) protocol is a central component in distributed cryptosystems, it allows a group of participants to jointly generate private key and public key, but only authorised subgroups of participants are able to reconstruct private key. However, the existing literatures based on DKG protocol assume equal authority for participants. Therefore, Birkhoff Interpolation-based Verifiable Hierarchical Threshold Secret Sharing (BI-VHTSS) algorithm was proposed. Considering the problem of DKG, authorized subsets were defined by a hierarchical threshold access structure in BI-VHTSS algorithm. On the basis of intractability of the Discrete Logarithm Problem (DLP) and Birkhoff interpolation, the correctness and security of the proposed algorithm were also proved.

Key words: verifiable, hierarchical, Birkhoff interpolation, threshold secret sharing

中图分类号: