Threshold Function Secret Sharing Scheme Based on Polynomial Interpolation
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Since the existing function secret sharing schemes require all participants to join in the reconstruction phase. Therefore, it cannot be flexibly applied to real-world scenarios. A function secret sharing scheme with thresholds is constructed in this study using polynomial techniques. According to the security model of function secret sharing, we proved that the proposed scheme has security in the sense of information theory. In addition, this study analyzes the function secret sharing scheme proposed by Yuan et al., and expounds the reason why their scheme does not satisfy the security of function secret sharing. Finally, a comprehensive comparison between the newly constructed scheme and the existing function secret sharing scheme is found. We note that the newly constructed scheme has higher level of security and higher efficiency through the comprehensive comparison.

    Reference
    Related
    Cited by
Get Citation

罗景龙,林昌露,李朝珍,张剑.基于多项式插值的门限函数秘密分享方案.计算机系统应用,2020,29(5):29-35

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:September 28,2019
  • Revised:October 29,2019
  • Adopted:
  • Online: May 07,2020
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063