Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2015, Vol. 38 ›› Issue (5): 86-90.doi: 10.13190/j.jbupt.2015.05.016

• Reports • Previous Articles     Next Articles

Verifiable Multi-Use Dynamic Threshold Large Secret Sharing Scheme

CHANG Li-wei1,2, ZHENG Shi-hui2, XING You-song3, JIN Lei2, YANG Yi-xian2   

  1. 1. Faculty of Information Management, Shanxi University of Finance and Economics, Taiyuan 030006, China;
    2. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China;
    3. Nanyang Power Supply Company, State Grid Henan Electric Power Company, Henan Nanyang 473008, China
  • Received:2014-11-30 Online:2015-10-28 Published:2015-10-28

Abstract:

For the efficiency and security problems of large secret sharing, a verifiable multi-use dynamic thres hold large secret sharing scheme was put forward. To improve the efficiency, the large secret is divided and represented as a matrix over smaller finite field, and the two-variable one-way function is also utilized; to enhance security, the thres hold modification method is slightly expanded and the elliptic curve discrete logarithm problem is employed. By analysis, this new scheme not only is high-efficiency, but also can prevent dishonest participants from cheating. Meanwhile, the secret shadows can always be kept secret and need not to be renewed in the process of reconstruction. Especially, when the mutual trust varies or the number of the participants belonging to an organization fluctuates, the threshold value will be adjusted by at least t credible participants in time.

Key words: large secret sharing, high-efficiency, verifiable, multi-use, dynamic threshold

CLC Number: