Unlock instant, AI-driven research and patent intelligence for your innovation.

A verification method and device for secret data sharing

A technology of secret data and verification method, applied in the field of information security, can solve the problems of low efficiency, large amount of calculation and communication, and achieve the effect of small amount of calculation and communication, and high calculation efficiency

Active Publication Date: 2019-07-23
CHINA AGRI UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since the verification protocol of the existing secret data sharing method has problems such as a large amount of calculation and communication, and low efficiency, the present invention proposes a verification method and device for secret data sharing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A verification method and device for secret data sharing
  • A verification method and device for secret data sharing
  • A verification method and device for secret data sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The specific embodiments of the invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0048] figure 1 It shows a schematic flowchart of a secret data sharing verification method provided by an embodiment of the present invention, including:

[0049]S1. Divide the secret data into equal-length secret vectors expressed as the first preset number of blocks;

[0050] S2. Select a second preset number of random character string vectors, and determine a shared polynomial of secret data according to the random character string vectors;

[0051] S3. Calculate the ID, and calculate a third preset number of sub-share vectors of the secret vector according to the ID and the shared polynomial;

[0052] S4. Computational Sharing Commitment

[0053] S5. Verify the sub...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for verifying secret data sharing. The method comprises the steps of: expressing secret data as a first preset number of secret vectors; selecting a second preset number of random character string vectors, and according to the random character string vectors, determining a sharing polynomial of the secret vectors; calculating an identity identifier, and according to the sharing polynomial and the identity identifier, calculating to obtain a third preset number of sub share vectors of the secret vectors; and calculating a sharing promise (with reference to the specification), verifying the sub share vectors according to the sharing promise, and determining correctness of the sub share vectors. According to the method and the device which are disclosed by the invention, the sharing polynomial of the secret data is determined by the random character string vectors, the sub share vectors of the secret vectors are calculated according to the sharing polynomial, and by a verification formula, the sub share vectors are verified; both a calculated amount and communication traffic are small; and calculation efficiency is relatively high.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a verification method and device for secret data sharing. Background technique [0002] Secret sharing is an important means of information security and data confidentiality, and it plays a key role in the safe storage, transmission and legal utilization of important information and secret data. Among them, Shamir's scheme is a classic among the secret sharing schemes. Its basic idea is to divide the shared secret S into n shares and distribute them to different participants, satisfying that the shared secret can be reconstructed only when more than or equal to t servers are united, and any number of small Since t servers cannot get any information about the secret. However, the Shamir scheme needs to assume two premises: one is that the secret distributor is always honest; the other is that the keepers of n shares have completely equal status and rights, and have e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/085H04L9/0869H04L63/062H04L63/067
Inventor 吕春利张博曾子川申长虹刘瑜马钦
Owner CHINA AGRI UNIV