Threshold secret information distribution and recovery method and device

A threshold secret and information distribution technology, applied in the field of information security, can solve the problems of not allowing participants to share, the amount of restoration calculation cannot be reduced, and the efficiency is low.

Inactive Publication Date: 2010-11-10
CHINA AGRI UNIV
View PDF6 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1. When k is closer to n, the calculation amount of secret distribution and restoration of this scheme is larger and the efficiency is lower;
[0008] 2. Even if there are more than k shares participating in the secret restoration, the calculation amount of restoration cannot be reduced;
[0009] 3. Participants are not allowed to choose the shares they hold

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threshold secret information distribution and recovery method and device
  • Threshold secret information distribution and recovery method and device
  • Threshold secret information distribution and recovery method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The device and method for allocating and restoring threshold secret information proposed by the present invention are described as follows in conjunction with the accompanying drawings and embodiments.

[0062] Such as figure 1 As shown, it is the threshold secret information distribution device of the present invention, which includes: a secret information dividing device, which is used to divide the secret information (such as the college entrance examination paper) divided into p-1 parts: s 0 ,s 1 ,s 2 ,...,s p-2 , and set the secret information vector p is a prime number greater than or equal to n-1, and the preferred division method is equally divided by equal length; the random information string generating device is used to generate (k-1)×(p-1) random information strings r i,l , and set the random string information vector group Among them, 0≤i≤p-2, l1=l=0, 1, ..., k-2, k≤n, the random information string is preferably equal in length and equal in length ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a threshold secret information distribution method which divides secret information into n-numbered information portions. The method comprises the following steps: dividing secret information into p-1 parts, wherein p is a prime and is not less than n-1; generating (k-1)*(p-1) random information strings; generating a binary operation matrix with (n-k+1)*(n+1) blocks; and generating n-numbered information portions according to the p-1 parts of secret information, the random information strings and the binary operation matrix, and distributing to n-numbered sharers. The invention also discloses a threshold secret information recovery method, wherein when at least random k-numbered information portions are known, secret information is recovered. The invention also discloses a threshold secret information distribution device and recovery device. The closer k is to n, the lower computational loads and higher efficiencies the threshold secret distribution and recovery devices have; and the distribution and recovery of threshold secret information can be completed by the same device.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a device and method for allocating and restoring threshold secret information. Background technique [0002] Secret sharing is an important means of information security and data confidentiality, and it plays a key role in the safe storage, transmission and legal utilization of important information and secret data. (k, n) threshold secret sharing concept by Shamir [2] and Blakley [3] It is proposed that the basic idea is that a secret is shared by n people, and it satisfies: ① Only k or more participants can jointly reconstruct the secret; ② Any less than k participants cannot get any information about the secret. A scheme that satisfies ① and ② is called a perfect secret sharing scheme. In addition, if it satisfies ③ the size of the share held by each participant is as large as the original secret, this scheme is called an ideal secret sharing scheme. S...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
Inventor 吕春利孙明理田立军伍强孙秀丽
Owner CHINA AGRI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products