会议专题

Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials over Elliptic Curve

Traditional secret sharing scheme generally exists two shortages:each participants sub-secret key is distributed by the certification center; the sub-secret keys can not be repeated to use. Both shortages brought to the practical application a lot of inconvenience, and n sub-secret keys can only be used to share a master key in terms of resources is a waste. This article based on the reference 6 proposed a scheme with sub-secret keys be selected by participants, and those sub-secret keys can be reused. The scheme based on the security of elliptic curve discrete most of the difficult nature is more practical than the reference 6, and the realization of the process can solve the problem about the authenticity of the sub-secret keys.

secret sharing Certification Center subsecret keys elliptic curve discrete logarithm problem

Wang Caimei Li Zhengmao

Hefei University Key Laboratory of Network and Intelligent Information Processing Hefei China

国际会议

The Fifth International Conference on Information Assurance and Security(第五届信息保障与安全国际会议)

西安

英文

734-737

2009-08-18(万方平台首次上网日期,不代表论文的发表时间)