Check patentability & draft patents in minutes with Patsnap Eureka AI!

Self-secure Tightly Coupled Secret Sharing Method

A technology of secret sharing and tight coupling, which is applied in the field of self-secure tightly coupled secret sharing, which can solve the problems that the threshold secret sharing scheme cannot be directly used to construct group authentication schemes, and cannot be directly used to construct other group-oriented scenarios, so as to achieve robustness Good results

Active Publication Date: 2020-08-25
UNIV OF SCI & TECH OF CHINA
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] These two security issues and the special functional requirements of the group scenario application determine that the traditional (t,n) threshold secret sharing scheme represented by the Shamir(t,n) scheme cannot be directly used to construct a group authentication scheme, nor can it be directly used Therefore, it is necessary to construct a new secret sharing scheme to adapt to group authentication and other group-oriented applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-secure Tightly Coupled Secret Sharing Method
  • Self-secure Tightly Coupled Secret Sharing Method
  • Self-secure Tightly Coupled Secret Sharing Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0031] The embodiment of the present invention provides a self-secure tightly coupled (t, m, n) secret sharing method, which assumes that there is a secret distributor Dealer, and n secret share holders {U i |i=1,2,...,,n}, which satisfies:

[0032] a) t(t≤n) or more than t share holders can recover the secret, but less than t share holders cannot recover the secret;

[0033] b) An authorization group with m (n≥m≥t) share holders is a tightly coup...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a self-safe tightly coupled secret sharing method. The method allows participants to secretly exchange information without relying on a pre-established secure channel during asecret recovery phase, that is, a private channel between any two participants can be established temporarily and flexibly. At that same time, an external attack attempting to acquire the secret needto crack at least m / 2 secure channels, instead of the traditional scheme t / 2 secure channels; Because m >= t, the robustness to channel cracking attacks is better.

Description

technical field [0001] The invention relates to the technical field of network and information security, in particular to a self-safe tightly coupled secret sharing method. Background technique [0002] 1. Secret sharing: [0003] The basic idea of ​​(t,n) threshold secret sharing is to divide a secret into n secret shares, and distribute each share to a participant. Only t(t≤n) or more participants can cooperate. To recover the secret, less than t participants cannot recover the secret, where t is the threshold value. [0004] There are many ways to implement the (t,n) threshold secret sharing scheme, among which the most widely used one is the Shamir secret sharing scheme: [0005] The scheme assumes that D is the secret distributor, n is the number of participants, t is the threshold value, p is a large prime number much larger than n; the secret space and share space are finite fields GF(p). The (t,n) threshold secret sharing scheme is divided into two components: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/085
Inventor 苗付友于跃孟珂举陆长彬
Owner UNIV OF SCI & TECH OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More