Journal of South China University of Technology (Natural Science Edition) ›› 2007, Vol. 35 ›› Issue (10): 168-171,177.

• Electronics, Communication & Automation Technology • Previous Articles     Next Articles

Special Threshold Secret Sharing 岛lethods and Their Applications

Tang Shao-hua   

  1. School of Computer Science and Engineering , South China Univ. of Tech. , Guangzhou 510640 , Guangdong , China
  • Received:2007-03-01 Online:2007-10-25 Published:2007-10-25
  • Contact: 唐韶华(1970-) ,男,教授,博士生导师,主要从事信息安全、计算机网络研究 E-mail:csshtang @ scut.edu. cn
  • About author:唐韶华(1970-) ,男,教授,博士生导师,主要从事信息安全、计算机网络研究
  • Supported by:

    国家自然科学基金资助项目(60572139) ;霍英东教育基金会资助项目(1 01069) ;教育部新世纪人才支持t十划( NCET -06-0744)

Abstract:

Based on the practical requirements of the electronic bidding system , the concept of special threshold secret sharing is proposed , which owns the features and properties of that the designated person must participate , that a group acts as a unit , or that the designated group must participate. Corresponding to the actual requirements , some secret sharing algorithms are designed to solve the practical problems by adopting the multi-threshold method based on Shamir's secret sharing principle , which include the one that the designated person must participate , the one that a group acts as a unit , and the one that the designated group must participate. It is shown by theoretical analysis that the proposed algorithms are secure and effective. Moreover , the designed algorithms are practically applied to an electronic bidding system. The results indicate that the system runs stably and the algorithm works efficiently.

Key words: secret sharing, threshold CIγptography, special threshold secret sharing, electronic bidding