Journal of South China University of Technology (Natural Science Edition) ›› 2006, Vol. 34 ›› Issue (6): 95-98.

• Computer Science & Technology • Previous Articles     Next Articles

Multi-Secret Sharing Scheme with General Access Structures

Li Hui-xian1  Cheng Chun-tian2  Pang Liao-jun3   

  1. 1.Dept.of Computer Science and Engineering,Dalian Univ.of Tech.,Dalian 116024,Liaoning,China;2.Institute of Hydropower System and Hydroinformatics,Dalian Univ.of Tech.,Dalian 116024,Liaoning,China;3.National Key Laboratory of Integrated Service Networks,Xidian Univ.,Xi’an 710071,Shaanxi,China
  • Received:2005-04-28 Online:2006-06-25 Published:2006-06-25
  • Contact: 李慧贤(1977-),女,博士生,主要从事电子商务中的安全理论与技术、并行计算方面的研究 E-mail:hXli@student.dlut.edu.cn
  • About author:李慧贤(1977-),女,博士生,主要从事电子商务中的安全理论与技术、并行计算方面的研究
  • Supported by:

    国家自然科学基金资助项目(50479055);国家973重大项目(G1999035805)

Abstract:

In order to widen the application of multi-secret sharing schemes,a multi-secret sharing scheme with general access structures was proposed based on Shamir’s threshold secret sharing scheme,in which multiple secrets are shared in each sharing session,and the secret shadow of each participant is reused,with a length as long as that of one shared secret.All these are different from the existing schemes.Analytical results show that,as COBpared with the existing schemes,the proposed scheme reduces the computational complexity of secret distribution and secret reconstruction algorithms and that it implements the sharing of multiple secrets,thus improving the sys tem performance.

Key words: inform ation security, multi-secret sharing, access structure