华南理工大学学报(自然科学版) ›› 2007, Vol. 35 ›› Issue (10): 168-171,177.

• 创刊五十周年纪念专辑 • 上一篇    下一篇

特殊门限秘密共享方法及其应用

唐韶华   

  1. 华南理工大学 计算机科学与工程学院,广东 广州 510640
  • 收稿日期:2007-03-01 出版日期:2007-10-25 发布日期:2007-10-25
  • 通信作者: 唐韶华(1970-) ,男,教授,博士生导师,主要从事信息安全、计算机网络研究 E-mail:csshtang @ scut.edu. cn
  • 作者简介:唐韶华(1970-) ,男,教授,博士生导师,主要从事信息安全、计算机网络研究
  • 基金资助:

    国家自然科学基金资助项目(60572139) ;霍英东教育基金会资助项目(1 01069) ;教育部新世纪人才支持t十划( NCET -06-0744)

Special Threshold Secret Sharing 岛lethods and Their Applications

Tang Shao-hua   

  1. School of Computer Science and Engineering , South China Univ. of Tech. , Guangzhou 510640 , Guangdong , China
  • Received:2007-03-01 Online:2007-10-25 Published:2007-10-25
  • Contact: 唐韶华(1970-) ,男,教授,博士生导师,主要从事信息安全、计算机网络研究 E-mail:csshtang @ scut.edu. cn
  • About author:唐韶华(1970-) ,男,教授,博士生导师,主要从事信息安全、计算机网络研究
  • Supported by:

    国家自然科学基金资助项目(60572139) ;霍英东教育基金会资助项目(1 01069) ;教育部新世纪人才支持t十划( NCET -06-0744)

摘要: 从电子招投标系统的实际需求出友,提出了特殊门限秘密共享的概念,即具有指定人必须参与、以纽为羊位、指定纽必须参与等性质特征的秘密共享方法.相应于实际需求,基于Shamir 秘密共享原理,采用多重门眠的方法设计了指定人必须参与的秘密共享、以组为单位的秘密共享、指定纽必须参与的秘密共享等算法,解决了实际问题.理论分析表明,文中算法是安全、有效的.所设计的算法已被实际应用于电子招投标系统中,经实践证明,系统运行稳定,算法的执行效率高.

关键词: 秘密共享, 门限密码, 特殊门限秘密共享, 电子招投标

Abstract:

Based on the practical requirements of the electronic bidding system , the concept of special threshold secret sharing is proposed , which owns the features and properties of that the designated person must participate , that a group acts as a unit , or that the designated group must participate. Corresponding to the actual requirements , some secret sharing algorithms are designed to solve the practical problems by adopting the multi-threshold method based on Shamir's secret sharing principle , which include the one that the designated person must participate , the one that a group acts as a unit , and the one that the designated group must participate. It is shown by theoretical analysis that the proposed algorithms are secure and effective. Moreover , the designed algorithms are practically applied to an electronic bidding system. The results indicate that the system runs stably and the algorithm works efficiently.

Key words: secret sharing, threshold CIγptography, special threshold secret sharing, electronic bidding