Unlock instant, AI-driven research and patent intelligence for your innovation.

A secret sharing method and secret sharing system

A secret sharing, secret technology, applied in the field of communication, to achieve the effect of improving flexibility

Active Publication Date: 2018-06-05
CHINA MOBILE COMM GRP CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the cryptosplitting technology used in this method divides and distributes the data according to predetermined or randomly generated data unit size patterns, sequences or combinations, and only divides the data into groups based on the length of the data to achieve the purpose of cryptosplitting. , which has certain limitations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secret sharing method and secret sharing system
  • A secret sharing method and secret sharing system
  • A secret sharing method and secret sharing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Embodiments of the present invention provide a technical solution for secret sharing based on bit operations of binary secret sequences. In this technical solution, the non-M sequence is used as the sub-secret sequence of the secret sequence M for secret sharing, so as to expand the application range of the secret sharing scheme and improve the flexibility, controllability and non-repudiation of secret sharing.

[0021] Among them, in the embodiment of the present invention, the secret sequence is the binary sequence corresponding to the secret that needs to be shared (that is, the secret that needs to be shared is converted into binary), and the non-M sequence (that is, the sub-secret sequence) has the same number of bits as the secret sequence M, but There are at least one different binary sequence.

[0022] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secret sharing method and a secret sharing system. The method includes the steps of determining a binary secret sequence corresponding to a secret to be shared, generating s different binary sub-secret sequences according to the secret sequence and the number t of sharing users, and distributing the sub-secret sequences according to the number s of the sub-secret sequences and the number t of the sharing users, wherein the number of digits of the sub-secret sequences and the number of digits of the secret sequence are the same, at least one digit of the sub-secret sequences and at least one digit of the secret sequence are different, and s is larger than or equal to t. In the method, flexibility, controllability and repudiation resistance of secret sharing are improved.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a secret sharing method and a secret sharing system. Background technique [0002] With the rapid development of computer network and communication technology, the problem of information security has become increasingly prominent. Modern cryptography technology plays an important role in ensuring the confidentiality, integrity, availability, reliability and non-repudiation of information. Among them, the secret sharing mechanism is a core part of the password management mechanism and the decentralization mechanism. [0003] For current computer systems and communication systems, a large amount of confidential information is stored in the computer in the form of documents, and different keys are used to protect them according to different types and levels of encryption. Usually, in order to facilitate the management of a large number of keys, use All of the keys may be pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 程叶霞何申杨光华孙楠秦瑞杨凯陈磊胡海涛
Owner CHINA MOBILE COMM GRP CO LTD