A Recovery Method for Expired Shares Based on (k,n) Threshold Secret Sharing
A recovery method and threshold secret technology, which is applied in the field of key management, can solve the problems of original secret exposure, etc., and achieve the effects of easy operation, enhanced practicability, and simple steps
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0019] Assumptions: 1. The secret to be shared is 1; 2. The threshold of the secret sharing system is (3,n), where n is an integer greater than 3; 3. All operations are performed on the modulo 7 integer finite field; 4. Confirmation The polynomial of the secret sharing system is f(x)=2x 2 +3x+1.
[0020] According to the assumption, the share holder P is obtained 1 ~P 4 The shares of f(1)=6, f(2)=1, f(3)=0, f(4)=3 respectively. When share holder P 4 After the share f(4) is lost or damaged, it can be recovered according to the following steps:
[0021] S1. Select k effective share holders, that is, 3 effective share holders, denoted as p 1 ,p 2 ,p 3 , its holding shares are denoted as F(1), F(2), F(3), that is, F(1)=f(1)=6, F(2)=f(2)=1, F(3 ) = f(3) = 0
[0022] S2. For share holders p 1 Arbitrarily choose to satisfy the condition g 1 (r)=g 1 (4) = 0 and g 1 (0)≠0 polynomial: g 1 (x)=x 2 +6x+2;
[0023] To share holders p 2 Arbitrarily choose to satisfy the con...
Embodiment 2
[0034] Assumptions: 1. The secret that needs to be shared is 1; 2. The threshold of the secret sharing system is (4,6); 2. The secret that needs to be shared is 1; 3. All operations are performed on the modulo 11 integer finite field; 4 , The polynomial to determine the secret sharing system is f(x)=x 3 +2x 2 +3x+1.
[0035] According to the assumption, the share holder P is obtained 1 ~P 6 The shares of f(1)=7, f(2)=1, f(3)=0, f(4)=10, f(5)=4, f(6)=10 respectively. When share holder P 3 and P 4 After the shares f(3) and f(4) are lost or damaged, they can be recovered according to the following steps:
[0036] Recover holder P first 3 share f(3), the steps are as follows:
[0037] S1. Select holders of k valid shares, that is, 4 valid share holders, denoted as p 1 ,p 2 ,p 3 ,p 4 , its holding shares are denoted as F(1), F(2), F(3), F(4), that is, F(1)=f(1)=7, F(2)=f(2)= 1, F(3)=f(5)=4, F(4)=f(6)=10;
[0038] S2. For share holders p 1 Arbitrarily choose to satisf...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
