門限秘密共享策略及其應(yīng)用研究
發(fā)布時(shí)間:2018-11-24 14:26
【摘要】:隨著計(jì)算機(jī)技術(shù)和互聯(lián)網(wǎng)技術(shù)的飛速發(fā)展,對(duì)重要信息的保密性和完整性的要求也越來越嚴(yán)格。門限秘密共享為保護(hù)信息的安全和完整提供了有效策略,成為了密碼學(xué)領(lǐng)域的一個(gè)重要的研究分支和信息安全方向的研究熱點(diǎn)。因此,對(duì)秘密共享策略的研究不僅具有重要的理論意義,而且還有廣闊的實(shí)際應(yīng)用前景。本文詳細(xì)描述了門限秘密共享策略的研究背景、意義和現(xiàn)狀,并以多秘密共享策略,多等級(jí)門限秘密共享策略,以及可變門限秘密共享策略為研究出發(fā)點(diǎn),對(duì)門限秘密共享策略及其應(yīng)用進(jìn)行了深入分析與研究。主要研究成果如下: (1)基于Tassa多等級(jí)門限秘密共享策略和Mignotte秘密共享策略,本文提出了一種可重用的基于多屬性劃分的多等級(jí)門限秘密共享策略。針對(duì)傳統(tǒng)多等級(jí)門限秘密共享策略中參與者劃分的局限性,本策略基于參與者多種屬性對(duì)參與者集合進(jìn)行劃分。之后,結(jié)合Yang等多秘密共享策略和Tassa多等級(jí)門限秘密共享策略,提出了多秘密多等級(jí)門限秘密共享策略,使得在本策略中,一次多等級(jí)門限秘密共享過程可以共享多個(gè)秘密。 (2)基于Birkhoff插值法和雙變量單向函數(shù)提出了兩個(gè)改進(jìn)的可變門限秘密共享策略:(tmin←t→tmax,n)可變門限秘密共享策略和([t1,…tm,],n)可變門限秘密共享策略。在(tmin←t→tmax,n)可變門限秘密共享策略中,分發(fā)者可以根據(jù)安全協(xié)議來變更門限,使密鑰恢復(fù)門限減小到tmin或增大到tmax。在(t,…,tm],n)可變門限秘密共享策略中,在分發(fā)者廣播門限激活信息前,任何參與者子集都無法恢復(fù)共享秘密。與現(xiàn)存同類可變門限秘密共享策略相比,該策略具有更少的存儲(chǔ)空間和廣播信息,且參與者的份額信息可以被重復(fù)使用。 (3)基于Hsu等多秘密共享策略和改進(jìn)ElGamal簽名策略,提出了一種可追蹤群組門限簽名策略。在該策略中,任何合格簽名組子集都可以生成獨(dú)一無二的群組簽名,驗(yàn)證者可以只根據(jù)群組簽名本身追蹤到參與簽名的簽名者。 (4)基于Shamir秘密共享策略和Bao等自恢復(fù)密鑰分發(fā)策略,在無線傳感網(wǎng)路環(huán)境中,提出了改進(jìn)的自恢復(fù)密鑰分發(fā)策略。在自恢復(fù)密鑰分發(fā)策略中,即使在一些會(huì)話中廣播數(shù)據(jù)包出現(xiàn)丟失,無線節(jié)點(diǎn)也可以通過自身私鑰和之前收到的廣播數(shù)據(jù)包恢復(fù)出丟失的會(huì)話密鑰,而不需要向群組管理者申請(qǐng)額外的數(shù)據(jù)傳輸。在策略實(shí)現(xiàn)時(shí),本策略只使用了一個(gè)秘密多項(xiàng)式和改進(jìn)的訪問多項(xiàng)式。因此,本策略具有常數(shù)存儲(chǔ)空間和較低的通信負(fù)擔(dān)。
[Abstract]:With the rapid development of computer technology and Internet technology, the requirements of confidentiality and integrity of important information become more and more strict. Threshold secret sharing provides an effective strategy to protect the security and integrity of information. It has become an important branch of cryptography and a research hotspot in the field of information security. Therefore, the study of secret sharing strategy not only has important theoretical significance, but also has a broad prospect of practical application. This paper describes the background, significance and current situation of threshold secret sharing strategy in detail, and takes multi-secret sharing strategy, multi-level threshold secret sharing strategy and variable threshold secret sharing strategy as the starting point. The threshold secret sharing strategy and its application are deeply analyzed and studied. The main research results are as follows: (1) based on Tassa multi-level threshold secret sharing strategy and Mignotte secret sharing strategy, this paper proposes a reusable multi-level threshold secret sharing strategy based on multi-attribute partitioning. Aiming at the limitation of participant partitioning in the traditional multi-level threshold secret sharing strategy, this strategy divides the participant set based on the multiple attributes of the participant. Then, combining the multi-secret sharing strategy such as Yang and Tassa multi-level threshold secret sharing strategy, a multi-secret multi-level threshold secret sharing strategy is proposed, so that in this strategy, the multi-level threshold secret sharing process can share multiple secrets at a time. (2) based on Birkhoff interpolation method and bivariate unidirectional function, two improved variable threshold secret sharing policies,: (tmin and tmax,n, are proposed. Tm,], n) variable threshold secret sharing strategy. In the (tmin / tmax,n) variable threshold secret sharing policy, the distributor can change the threshold according to the security protocol, reducing the threshold of key recovery to tmin or increasing to tmax. In (t,.) In the, n) variable threshold secret sharing strategy, no participant subset can recover the shared secret before the distributor broadcasts threshold activation information. Compared with the existing variable threshold secret sharing strategy, this strategy has less storage space and broadcast information, and the participant's share information can be reused. (3) based on the multi-secret sharing strategy such as Hsu and the improved ElGamal signature strategy, a traceable group threshold signature strategy is proposed. In this strategy, any subset of qualified signature groups can generate a unique group signature, and the verifier can trace to the signer participating in the signature only according to the group signature itself. (4) based on Shamir secret sharing strategy and self-recovery key distribution strategy such as Bao, an improved self-recovery key distribution strategy is proposed in wireless sensor networks. In a self-recovery key distribution strategy, even if a broadcast packet is lost in some sessions, the wireless node can recover the lost session key through its own private key and the previously received broadcast packet. There is no need to apply to the group manager for additional data transfers. In the implementation of the policy, only a secret polynomial and an improved access polynomial are used. Therefore, this policy has constant storage space and low communication burden.
【學(xué)位授予單位】:大連理工大學(xué)
【學(xué)位級(jí)別】:博士
【學(xué)位授予年份】:2014
【分類號(hào)】:TN918.2
[Abstract]:With the rapid development of computer technology and Internet technology, the requirements of confidentiality and integrity of important information become more and more strict. Threshold secret sharing provides an effective strategy to protect the security and integrity of information. It has become an important branch of cryptography and a research hotspot in the field of information security. Therefore, the study of secret sharing strategy not only has important theoretical significance, but also has a broad prospect of practical application. This paper describes the background, significance and current situation of threshold secret sharing strategy in detail, and takes multi-secret sharing strategy, multi-level threshold secret sharing strategy and variable threshold secret sharing strategy as the starting point. The threshold secret sharing strategy and its application are deeply analyzed and studied. The main research results are as follows: (1) based on Tassa multi-level threshold secret sharing strategy and Mignotte secret sharing strategy, this paper proposes a reusable multi-level threshold secret sharing strategy based on multi-attribute partitioning. Aiming at the limitation of participant partitioning in the traditional multi-level threshold secret sharing strategy, this strategy divides the participant set based on the multiple attributes of the participant. Then, combining the multi-secret sharing strategy such as Yang and Tassa multi-level threshold secret sharing strategy, a multi-secret multi-level threshold secret sharing strategy is proposed, so that in this strategy, the multi-level threshold secret sharing process can share multiple secrets at a time. (2) based on Birkhoff interpolation method and bivariate unidirectional function, two improved variable threshold secret sharing policies,: (tmin and tmax,n, are proposed. Tm,], n) variable threshold secret sharing strategy. In the (tmin / tmax,n) variable threshold secret sharing policy, the distributor can change the threshold according to the security protocol, reducing the threshold of key recovery to tmin or increasing to tmax. In (t,.) In the, n) variable threshold secret sharing strategy, no participant subset can recover the shared secret before the distributor broadcasts threshold activation information. Compared with the existing variable threshold secret sharing strategy, this strategy has less storage space and broadcast information, and the participant's share information can be reused. (3) based on the multi-secret sharing strategy such as Hsu and the improved ElGamal signature strategy, a traceable group threshold signature strategy is proposed. In this strategy, any subset of qualified signature groups can generate a unique group signature, and the verifier can trace to the signer participating in the signature only according to the group signature itself. (4) based on Shamir secret sharing strategy and self-recovery key distribution strategy such as Bao, an improved self-recovery key distribution strategy is proposed in wireless sensor networks. In a self-recovery key distribution strategy, even if a broadcast packet is lost in some sessions, the wireless node can recover the lost session key through its own private key and the previously received broadcast packet. There is no need to apply to the group manager for additional data transfers. In the implementation of the policy, only a secret polynomial and an improved access polynomial are used. Therefore, this policy has constant storage space and low communication burden.
【學(xué)位授予單位】:大連理工大學(xué)
【學(xué)位級(jí)別】:博士
【學(xué)位授予年份】:2014
【分類號(hào)】:TN918.2
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 謝琪;兩種門限簽名方案的密碼學(xué)分析及其改進(jìn)[J];通信學(xué)報(bào);2005年07期
2 張R,
本文編號(hào):2354067
本文鏈接:http://sikaile.net/kejilunwen/wltx/2354067.html
最近更新
教材專著