Verifiable special threshold secret sharing scheme based on eigenvalue
Utilizing the characteristic that the characteristic equation of the n-th order matrix have multiple roots,the secret distributor distributes two different sub-keys to each participant,and these two sub-keys satisfy two conditions:linear independent and equality of the corresponding characteristic v...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-08-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018143/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539451915862016 |
---|---|
author | Yanshuo ZHANG Wenjing LI Lei CHEN Wei BI Tao YANG |
author_facet | Yanshuo ZHANG Wenjing LI Lei CHEN Wei BI Tao YANG |
author_sort | Yanshuo ZHANG |
collection | DOAJ |
description | Utilizing the characteristic that the characteristic equation of the n-th order matrix have multiple roots,the secret distributor distributes two different sub-keys to each participant,and these two sub-keys satisfy two conditions:linear independent and equality of the corresponding characteristic values.In the process of sub-key distribution and master key recovery,the black box can judge the authenticity of the participants’ activities through the characteristics of the sub-keys.If the two sub-keys have satisfied two conditions of linear independence and equal feature values,it can be determined that the participant’s activity is honest,otherwise,it can be determined that there exists fraudulent activity.The analysis results show that the scheme is correct,secure,and the information rate is 12. |
format | Article |
id | doaj-art-b2c1f3fdb8dc4346bc3f1cc49891ab70 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2018-08-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-b2c1f3fdb8dc4346bc3f1cc49891ab702025-01-14T07:15:22ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-08-013916917559720245Verifiable special threshold secret sharing scheme based on eigenvalueYanshuo ZHANGWenjing LILei CHENWei BITao YANGUtilizing the characteristic that the characteristic equation of the n-th order matrix have multiple roots,the secret distributor distributes two different sub-keys to each participant,and these two sub-keys satisfy two conditions:linear independent and equality of the corresponding characteristic values.In the process of sub-key distribution and master key recovery,the black box can judge the authenticity of the participants’ activities through the characteristics of the sub-keys.If the two sub-keys have satisfied two conditions of linear independence and equal feature values,it can be determined that the participant’s activity is honest,otherwise,it can be determined that there exists fraudulent activity.The analysis results show that the scheme is correct,secure,and the information rate is 12.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018143/secret sharingeigenvalueverifiableblack box |
spellingShingle | Yanshuo ZHANG Wenjing LI Lei CHEN Wei BI Tao YANG Verifiable special threshold secret sharing scheme based on eigenvalue Tongxin xuebao secret sharing eigenvalue verifiable black box |
title | Verifiable special threshold secret sharing scheme based on eigenvalue |
title_full | Verifiable special threshold secret sharing scheme based on eigenvalue |
title_fullStr | Verifiable special threshold secret sharing scheme based on eigenvalue |
title_full_unstemmed | Verifiable special threshold secret sharing scheme based on eigenvalue |
title_short | Verifiable special threshold secret sharing scheme based on eigenvalue |
title_sort | verifiable special threshold secret sharing scheme based on eigenvalue |
topic | secret sharing eigenvalue verifiable black box |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018143/ |
work_keys_str_mv | AT yanshuozhang verifiablespecialthresholdsecretsharingschemebasedoneigenvalue AT wenjingli verifiablespecialthresholdsecretsharingschemebasedoneigenvalue AT leichen verifiablespecialthresholdsecretsharingschemebasedoneigenvalue AT weibi verifiablespecialthresholdsecretsharingschemebasedoneigenvalue AT taoyang verifiablespecialthresholdsecretsharingschemebasedoneigenvalue |