Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Rational Multiple Secret Sharing Method Fair to Honest Participants

A participant, multi-secret technology, applied in the field of information security, can solve the problems that participants cannot obtain secrets, are unfair, and cannot guarantee completion within a limited time.

Inactive Publication Date: 2015-12-09
HOHAI UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This may cause two problems: first, the distribution center is dishonest, and it distributes forged secret shares, so that the share holders cannot recover the secret even if they are all gathered together; second, the share holders are dishonest, and through Presenting a fake share prevents the recovery of the secret
[0012] In 2004, Halpern and Teague first proposed the concept of rational secret sharing, in which participants are no longer just honest and malicious participants, but introduce the concept of rational participants, and put forward utility assumptions for rational participants, rational Participants choose the execution strategy by calculating the utility value according to the utility function, and prove that the secret sharing with a fixed number of interactions in game theory cannot be guaranteed to be completed within a limited time
However, there is a problem in the above schemes. If there is a cheater cheating, all participants will not be able to obtain the secret, which is unfair to the rational participants who have always been honest.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Rational Multiple Secret Sharing Method Fair to Honest Participants
  • A Rational Multiple Secret Sharing Method Fair to Honest Participants
  • A Rational Multiple Secret Sharing Method Fair to Honest Participants

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Below in conjunction with the accompanying drawings, a rational multi-secret sharing method that is fair to honest participants proposed by the present invention will be described in detail:

[0038] like figure 1 As shown, a rational multiple secret sharing method that is fair to honest participants according to the present invention includes a system parameter setting module A, a distributor authentication module B, a secret distribution module C, and a secret reconstruction module D.

[0039] The system parameter setting module A is used to generate the public parameters of the system and the public keys of the distributor and the participant, and the public parameters are sent to the distributor authentication module B, the secret distribution module C, and the secret reconstruction module D;

[0040] The distributor authentication module B verifies the distributor through the bit commitment protocol to prevent the distributor from cheating;

[0041] The secret dis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a fair and rational multi-secret sharing method for honest participants. The method relates to a system parameter setting module, a distributor authentication module, a secret distributing module and a secret reconstructing module, wherein the system parameter setting module generates public parameters of a system and public keys of distributors and the participants, the public parameters are transmitted to the other modules, the distributor authentication module authenticates the distributors according to a bit commitment agreement, the secret distributing module mainly relates to that the distributors distribute sub-secrets to the corresponding participants, the secrets reconstructing module is mainly used for authenticating accuracy of the sub-secrets, deleting the participants having deceit behaviors from an assembly of the participants that reconstruct secrets and reconstructing the secrets by judging whether the secrets are meaningful. If new secrets need to be shared, just parameters and commitment values which are chosen randomly need to be publicized. According to the solution, the unfair problem to the honest participants is solved, and multi-secret sharing can be effectively achieved.

Description

technical field [0001] The invention belongs to the technical field of information security, and specifically refers to a rational multi-secret sharing method that is fair to honest participants. Background technique [0002] With the development of information technology and the popularization of computer and communication systems, people rely more and more on the Internet, such as online banking, electronic auctions, electronic bidding and electronic cash transactions. Therefore, more and more attention has been paid to how to ensure the security of information in the process of generation and transmission, and it has become an important research field of modern cryptography. The design and research of modern cryptographic systems are all carried out under the assumption of Kerckhoff. Under such assumptions, the security of cryptographic algorithms depends entirely on the security of the key. Therefore, the management or shared control of the key is in It occupies a very ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 李继国王飞张亦辰于启红钱惠玲滕美林郭宇燕石岳蓉郭俊赵雪霞赵晶晶
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products