• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
ZHANG Xing-lan, SHAO Hua. Cryptanalysis of a Publicly Verifiable Threshold Secret Sharing Scheme[J]. Journal of Beijing University of Technology, 2010, 36(4): 562-565.
Citation: ZHANG Xing-lan, SHAO Hua. Cryptanalysis of a Publicly Verifiable Threshold Secret Sharing Scheme[J]. Journal of Beijing University of Technology, 2010, 36(4): 562-565.

Cryptanalysis of a Publicly Verifiable Threshold Secret Sharing Scheme

More Information
  • Received Date: June 18, 2008
  • Available Online: December 14, 2022
  • By means of theoretical analyzing and experimental verifying, two flaws in the public verifiable threshold proactive secret sharing scheme proposed by Shi Runhua, are found.First, the value of threshold k can not be trusted.Second, the attackers can crack the secrets S in terms of public shares update algorithm.At last, new analyzing methods for proactive secret sharing scheme are proposed, which can conduct comprehensive analysis of forward-threshold secret sharing scheme by extending the completeness of proactive secret sharing scheme, and the unidirection of shares updated algorithm.
  • [1]
    CHOR B, GOLDWASSER S, MICAL S, et al.Verifiable secret sharing and achieving simultaneity in the presence of faults[C]∥Proc of IEEE FOCS 85.New York:IEEE Press, 1985:383-395.
    [2]
    PEDERSEN T P.Non-interactive and information-theoretic secure verifiable secret sharing[C]∥Proceeding of the 11thAnnual International Cryptology Conference.London:Springer-Verlag, 1991, 576:129-139.
    [3]
    GENNARO R, RABIN M, RABIN T.Simplified VSS and fast-track multiparty computations with applications to thresholdcryptography[C]∥Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing.NewYork:ACM Press, 1998:101-111.
    [4]
    NIKOV V, NIKOVA S.On proactive secret sharing schemes[M]∥Lecture Notes in Computer Science.Berlin:SpringerVerlag, 2004, 3357:308-325.
    [5]
    ASAEDA H, RAHMAN M, TOYAMA Y.Structuring proactive secret sharing in mobile ad-hoc networks[C]∥InternationalSymposium on Wireless Pervasive Computer (ISWPC) .Phuket, Thailand:IEEE, 2006:1-6.
    [6]
    高照锋, 叶延风, 庄毅.基于椭圆曲线密码体制的先应式秘密共享方案[J].计算机技术与发展, 2007, 17 (7) :131-134.GAO Zhao-feng, YE Yan-feng, ZHUANG Yi.A proactive secret sharing scheme based on the elliptic curve cryptosystem[J].Computer Technology and Development, 2007, 17 (7) :131-134. (in Chinese)
    [7]
    HERZBERG A, JARECKI S, KRAWCZYK H.Proactive secret sharing or:how to cope with perpetual leakage[C]∥Coppersmith Advances in Cryptology CRYPTO 95.Berlin:Springer Verlag, 1995:339-352.
    [8]
    石润华, 黄刘生.一种新的门限秘密共享方案[J].合肥工业大学学报:自然科学版, 2006, 29 (2) :163-168.SHI Run-hua, HUANG Liu-sheng.A new threshold secret sharing scheme[J].Journal of Hefei University of Technology:Natural Science, 2006, 29 (2) :163-168. (in Chinese)
    [9]
    石润华, 仲红, 黄刘生.公开可验证的门限秘密共享方案[J].微电子学与计算机, 2008, 25 (1) :29-33.SHI Run-hua, ZHONG Hong, HUANG Liu-sheng.A public verifiable threshold secret sharing scheme[J].Microelectronics&Computer, 2008, 25 (1) :29-33. (in Chinese)
  • Related Articles

    [1]BI Jing-guo, HAN Li-dong, LIU Ming-jie. Cryptanalysis of a Public-key Scheme Based on the Chinese Remainder Theorem[J]. Journal of Beijing University of Technology, 2012, 38(5): 768-772.
    [2]ZHOU You-sheng, XIN Yang, QING Si-han, YANG Yi-xian. Forward-backward Secure Group Signature Scheme[J]. Journal of Beijing University of Technology, 2012, 38(5): 736-739.
    [3]CAI Yong-quan, CHENG Fu-lai. Threshold Signature Scheme Based on Factorial Decompose Theorem of Polynomial[J]. Journal of Beijing University of Technology, 2012, 38(5): 727-729.
    [4]CAI Yong-quan, ZHANG En, HE Jing-yang. (t,n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J]. Journal of Beijing University of Technology, 2011, 37(8): 1231-1235.
    [5]LI Xue-lian, HU Yu-pu, GAO Jun-tao, FANG Yi-qi. The Nonlinearity Lower Bounds on the Second Order of Cubic Monomial Boolean Functions[J]. Journal of Beijing University of Technology, 2010, 36(5): 635-639.
    [6]WANG Hou-zhen, ZHANG Huan-guo, GUAN Hai-ming, WU Qian-hong. Multivariable Algebra Theory and Its Application in Cryptography[J]. Journal of Beijing University of Technology, 2010, 36(5): 627-634.
    [7]WANG Jian, JIANG Nan, LI Hui, NIU Xin-xin, YANG Yi-xian. Effective Access Authentication Protocol for Mobile Environments Based on SMS[J]. Journal of Beijing University of Technology, 2010, 36(2): 268-273.
    [8]YI Xiao-lin, ZHOU Wei, ZHAO Lei, JIN Yan-yan. A Proxy Signature Scheme Based on Hyperelliptic Curve[J]. Journal of Beijing University of Technology, 2009, 35(8): 1126-1131.
    [9]LI Xin-she, DU Xiao-hui, YIN Yi-feng, HU Yu-pu. Improvement of the Polymorphic Cipher and Its Analysis of the Strict Avalanche Criterion[J]. Journal of Beijing University of Technology, 2009, 35(6): 851-855.
    [10]Zheng Hao. Lexicographic Order and Its Application in Testing the Randomness of DES S-boxes[J]. Journal of Beijing University of Technology, 1993, 19(1): 34-41.

Catalog

    Article views (10) PDF downloads (7) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return