Multi-level secret sharing method for calculating safety under standard model and resisting memory leak

A standard model and memory leak technology, applied in computer security devices, calculations, instruments, etc., can solve problems such as inability to construct instances

Pending Publication Date: 2021-05-14
SHAANXI NORMAL UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the secret sharing method that is provably secure under the random oracle model cannot construct corresponding examples in specific applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-level secret sharing method for calculating safety under standard model and resisting memory leak
  • Multi-level secret sharing method for calculating safety under standard model and resisting memory leak
  • Multi-level secret sharing method for calculating safety under standard model and resisting memory leak

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0049] Please refer to Figure 1-3 , this embodiment provides a computationally secure multi-level secret sharing method against memory leaks under the standard model, using physical unclonable functions and fuzzy extractors to extract the same random and uniformly distributed strings to generate reliable secret shares.

[0050] Please refer to figure 1 , figure 1 It is a flowchart of an embodiment of the multi-level secret sharing method that is computationally secure against memory leaks under the standard model in the present invention. In some embodiments of the present invention, the multi-level secret sharing method that is computationally secure against memory leaks under the standard model method, the extraction method includes: an initialization phase, a share generation phase and a secret reconstruction phase.

[0051] Please refer to figure 2 and image 3 , figure 2 It is a flow chart of another embodiment of the multi-level secret sharing method that is comp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-memory leak multi-level secret sharing method for calculating safety under a standard model, which relates to the technical field of computer information safety, and comprises the following steps of: extracting the same character string which is randomly and uniformly distributed by utilizing the combined action of a physical unclonable function and a fuzzy extractor, namely generating a reliable secret share; in this way, the secret sharing method can meet the safety requirement under the environment of memory leakage. Meanwhile, according to the secret sharing method, the secret share of each participant can be used for multiple times and is used for recovering multiple secrets. According to the technical scheme, a verifiable multi-level secret sharing method which is suitable for a common access structure and is capable of resisting memory leakage is constructed instead of the idea of storing a long-term secret share in a nonvolatile memory in the prior art.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a multi-level secret sharing method which is computationally safe and anti-memory leakage under a standard model. Background technique [0002] Secret sharing is an important means in information security and data confidentiality, and it is also an important branch of modern cryptography. The secret sharing method is generally to design a share generation algorithm and secret in a group of participants; reconstruction algorithm, in which the authorized subset of participants can reconstruct the secret, and the unauthorized participant set cannot obtain any information about the secret. Most of the previous secret sharing is threshold secret sharing, that is, the number of authorized participants in the subset is the same. This is applicable when the power of the participants is equal, so there are certain limitations in practical applications. [0003] At t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245
Inventor 宋云李志慧李永明
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products