计算机与现代化 ›› 2012, Vol. 1 ›› Issue (11): 142-144.doi: 10.3969/j.issn.1006-2475.2012.11.035

• 信息安全 • 上一篇    下一篇

基于次序的(k, n, t, m, p)改进型门限方案

高振栋1,赵朋朋2   

  1. 1.无锡科技职业学院软件与服务外包学院,江苏 无锡 214028;2.苏州大学计算机科学与技术学院,江苏 苏州 215006
  • 收稿日期:2012-06-30 修回日期:1900-01-01 出版日期:2012-11-10 发布日期:2012-11-10

Improved (k, n, t, m, p) Threshold Scheme Based on Order

GAO Zhen-dong1, ZHAO Peng-peng2   

  1. 1. School of Software and Service Outsourcing, Wuxi Professional College of Science and Technology, Wuxi 214028, China;2. School of Computer Science and Technology, Soochow University, Suzhou 215006, China
  • Received:2012-06-30 Revised:1900-01-01 Online:2012-11-10 Published:2012-11-10

摘要: 门限方案作为秘密共享、密钥恢复的重要方法自从提出以来得到广泛研究和应用。本文考虑实际应用的需要并且为了增强传统门限方案的安全性,提出一种基于次序的改进型门限方案,通过近似无限地扩大次序组合排列的个数,使得攻击者即使获取所有秘密份额也难以恢复原始秘密,极大提高了门限方案的安全性,扩大了门限方案的应用场合。

关键词: 秘密共享, 门限, 密钥, 次序, 组合, 排列

Abstract: As an important method for secret sharing and key recovery, threshold scheme has been widely studied and applied since it has been proposed. Considering the needs of practical application and in order to enhance the security of traditional threshold scheme, this paper presents an improved threshold scheme based on order by approximate infinitely expanding the number of arrangement in the order of combination. So the attacker is difficult to recover the original secret even if he gets all shared secret. Thus, the security of threshold scheme is greatly increased, and the application of threshold scheme is expanded.

Key words: secret sharing, threshold, key, order, combination, arrangement

中图分类号: