门限秘密共享策略及其应用研究
发布时间:2018-11-24 14:26
【摘要】:随着计算机技术和互联网技术的飞速发展,对重要信息的保密性和完整性的要求也越来越严格。门限秘密共享为保护信息的安全和完整提供了有效策略,成为了密码学领域的一个重要的研究分支和信息安全方向的研究热点。因此,对秘密共享策略的研究不仅具有重要的理论意义,而且还有广阔的实际应用前景。本文详细描述了门限秘密共享策略的研究背景、意义和现状,并以多秘密共享策略,多等级门限秘密共享策略,以及可变门限秘密共享策略为研究出发点,对门限秘密共享策略及其应用进行了深入分析与研究。主要研究成果如下: (1)基于Tassa多等级门限秘密共享策略和Mignotte秘密共享策略,本文提出了一种可重用的基于多属性划分的多等级门限秘密共享策略。针对传统多等级门限秘密共享策略中参与者划分的局限性,本策略基于参与者多种属性对参与者集合进行划分。之后,结合Yang等多秘密共享策略和Tassa多等级门限秘密共享策略,提出了多秘密多等级门限秘密共享策略,使得在本策略中,一次多等级门限秘密共享过程可以共享多个秘密。 (2)基于Birkhoff插值法和双变量单向函数提出了两个改进的可变门限秘密共享策略:(tmin←t→tmax,n)可变门限秘密共享策略和([t1,…tm,],n)可变门限秘密共享策略。在(tmin←t→tmax,n)可变门限秘密共享策略中,分发者可以根据安全协议来变更门限,使密钥恢复门限减小到tmin或增大到tmax。在(t,…,tm],n)可变门限秘密共享策略中,在分发者广播门限激活信息前,任何参与者子集都无法恢复共享秘密。与现存同类可变门限秘密共享策略相比,该策略具有更少的存储空间和广播信息,且参与者的份额信息可以被重复使用。 (3)基于Hsu等多秘密共享策略和改进ElGamal签名策略,提出了一种可追踪群组门限签名策略。在该策略中,任何合格签名组子集都可以生成独一无二的群组签名,验证者可以只根据群组签名本身追踪到参与签名的签名者。 (4)基于Shamir秘密共享策略和Bao等自恢复密钥分发策略,在无线传感网路环境中,提出了改进的自恢复密钥分发策略。在自恢复密钥分发策略中,即使在一些会话中广播数据包出现丢失,无线节点也可以通过自身私钥和之前收到的广播数据包恢复出丢失的会话密钥,而不需要向群组管理者申请额外的数据传输。在策略实现时,本策略只使用了一个秘密多项式和改进的访问多项式。因此,本策略具有常数存储空间和较低的通信负担。
[Abstract]:With the rapid development of computer technology and Internet technology, the requirements of confidentiality and integrity of important information become more and more strict. Threshold secret sharing provides an effective strategy to protect the security and integrity of information. It has become an important branch of cryptography and a research hotspot in the field of information security. Therefore, the study of secret sharing strategy not only has important theoretical significance, but also has a broad prospect of practical application. This paper describes the background, significance and current situation of threshold secret sharing strategy in detail, and takes multi-secret sharing strategy, multi-level threshold secret sharing strategy and variable threshold secret sharing strategy as the starting point. The threshold secret sharing strategy and its application are deeply analyzed and studied. The main research results are as follows: (1) based on Tassa multi-level threshold secret sharing strategy and Mignotte secret sharing strategy, this paper proposes a reusable multi-level threshold secret sharing strategy based on multi-attribute partitioning. Aiming at the limitation of participant partitioning in the traditional multi-level threshold secret sharing strategy, this strategy divides the participant set based on the multiple attributes of the participant. Then, combining the multi-secret sharing strategy such as Yang and Tassa multi-level threshold secret sharing strategy, a multi-secret multi-level threshold secret sharing strategy is proposed, so that in this strategy, the multi-level threshold secret sharing process can share multiple secrets at a time. (2) based on Birkhoff interpolation method and bivariate unidirectional function, two improved variable threshold secret sharing policies,: (tmin and tmax,n, are proposed. Tm,], n) variable threshold secret sharing strategy. In the (tmin / tmax,n) variable threshold secret sharing policy, the distributor can change the threshold according to the security protocol, reducing the threshold of key recovery to tmin or increasing to tmax. In (t,.) In the, n) variable threshold secret sharing strategy, no participant subset can recover the shared secret before the distributor broadcasts threshold activation information. Compared with the existing variable threshold secret sharing strategy, this strategy has less storage space and broadcast information, and the participant's share information can be reused. (3) based on the multi-secret sharing strategy such as Hsu and the improved ElGamal signature strategy, a traceable group threshold signature strategy is proposed. In this strategy, any subset of qualified signature groups can generate a unique group signature, and the verifier can trace to the signer participating in the signature only according to the group signature itself. (4) based on Shamir secret sharing strategy and self-recovery key distribution strategy such as Bao, an improved self-recovery key distribution strategy is proposed in wireless sensor networks. In a self-recovery key distribution strategy, even if a broadcast packet is lost in some sessions, the wireless node can recover the lost session key through its own private key and the previously received broadcast packet. There is no need to apply to the group manager for additional data transfers. In the implementation of the policy, only a secret polynomial and an improved access polynomial are used. Therefore, this policy has constant storage space and low communication burden.
【学位授予单位】:大连理工大学
【学位级别】:博士
【学位授予年份】:2014
【分类号】:TN918.2
[Abstract]:With the rapid development of computer technology and Internet technology, the requirements of confidentiality and integrity of important information become more and more strict. Threshold secret sharing provides an effective strategy to protect the security and integrity of information. It has become an important branch of cryptography and a research hotspot in the field of information security. Therefore, the study of secret sharing strategy not only has important theoretical significance, but also has a broad prospect of practical application. This paper describes the background, significance and current situation of threshold secret sharing strategy in detail, and takes multi-secret sharing strategy, multi-level threshold secret sharing strategy and variable threshold secret sharing strategy as the starting point. The threshold secret sharing strategy and its application are deeply analyzed and studied. The main research results are as follows: (1) based on Tassa multi-level threshold secret sharing strategy and Mignotte secret sharing strategy, this paper proposes a reusable multi-level threshold secret sharing strategy based on multi-attribute partitioning. Aiming at the limitation of participant partitioning in the traditional multi-level threshold secret sharing strategy, this strategy divides the participant set based on the multiple attributes of the participant. Then, combining the multi-secret sharing strategy such as Yang and Tassa multi-level threshold secret sharing strategy, a multi-secret multi-level threshold secret sharing strategy is proposed, so that in this strategy, the multi-level threshold secret sharing process can share multiple secrets at a time. (2) based on Birkhoff interpolation method and bivariate unidirectional function, two improved variable threshold secret sharing policies,: (tmin and tmax,n, are proposed. Tm,], n) variable threshold secret sharing strategy. In the (tmin / tmax,n) variable threshold secret sharing policy, the distributor can change the threshold according to the security protocol, reducing the threshold of key recovery to tmin or increasing to tmax. In (t,.) In the, n) variable threshold secret sharing strategy, no participant subset can recover the shared secret before the distributor broadcasts threshold activation information. Compared with the existing variable threshold secret sharing strategy, this strategy has less storage space and broadcast information, and the participant's share information can be reused. (3) based on the multi-secret sharing strategy such as Hsu and the improved ElGamal signature strategy, a traceable group threshold signature strategy is proposed. In this strategy, any subset of qualified signature groups can generate a unique group signature, and the verifier can trace to the signer participating in the signature only according to the group signature itself. (4) based on Shamir secret sharing strategy and self-recovery key distribution strategy such as Bao, an improved self-recovery key distribution strategy is proposed in wireless sensor networks. In a self-recovery key distribution strategy, even if a broadcast packet is lost in some sessions, the wireless node can recover the lost session key through its own private key and the previously received broadcast packet. There is no need to apply to the group manager for additional data transfers. In the implementation of the policy, only a secret polynomial and an improved access polynomial are used. Therefore, this policy has constant storage space and low communication burden.
【学位授予单位】:大连理工大学
【学位级别】:博士
【学位授予年份】:2014
【分类号】:TN918.2
【相似文献】
相关期刊论文 前10条
1 谢琪;两种门限签名方案的密码学分析及其改进[J];通信学报;2005年07期
2 张R,
本文编号:2354067
本文链接:https://www.wllwen.com/kejilunwen/wltx/2354067.html