A verification method and device for secret data sharing
A technology of secret data and verification method, applied in the field of information security, can solve the problems of low efficiency, large amount of calculation and communication, and achieve the effect of small amount of calculation and communication, and high calculation efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0047] The specific embodiments of the invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.
[0048] figure 1 It shows a schematic flowchart of a secret data sharing verification method provided by an embodiment of the present invention, including:
[0049]S1. Divide the secret data into equal-length secret vectors expressed as the first preset number of blocks;
[0050] S2. Select a second preset number of random character string vectors, and determine a shared polynomial of secret data according to the random character string vectors;
[0051] S3. Calculate the ID, and calculate a third preset number of sub-share vectors of the secret vector according to the ID and the shared polynomial;
[0052] S4. Computational Sharing Commitment
[0053] S5. Verify the sub...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


