請用此 Handle URI 來引用此文件: http://hdl.handle.net/11455/17626
標題: 多重秘密分享方法之研究
A Study on Multiple Secret Sharing Scheme
作者: 黃國峰
Hwang, Kuo-Feng
關鍵字: secret sharing
秘密分享
systematic block codes
cryptography
系統化區塊碼
密碼學
出版社: 應用數學系所
引用: [1] G. R. Blakley, “Safeguarding Cryptographic Keys,” in Proc. AFIPS 1979 NCC, vol. 48, pp. 313-317, June 1979. [2] A. Shamir, “How to Share a Secret,” Commun. Assoc. Comput. Mach., vol. 22, pp. 612-613, 1979. [3] R. J. McEliece and D. V. Sarwate, “On Sharing Secrets and Reed-Solomon codes,” Commun. Assoc. Comput. Mach., vol. 24, pp. 583-584, Sept. 1981. [4] E. D. Karnin, J. W. Greene, and M. E. Hellman, “On Secret Sharing Systems,” IEEE Trans. Inform. Theory, vol. IT-29, pp. 35-41, Jan. 1983. [5] S. C. Kothari, “Generalized Linear Threshold Scheme,” in Advances in Cryptology—CRYPTO'84, G. R. Blakley and D. Chaum, Eds. (Lecture Notes in Computer Science, vol. 196). Berlin, Germany: Springer- Verlag, pp. 231-241, 1985. [6] J. Benaloh, “Secret Sharing Homomorphisms: Keeping Shares of a Secret ,” in Advances in Cryptology—CRYPTO'86, A. M. Odlyzko, Ed. (Lecture Notes in Computer Science, vol. 263). Berlin, Germany: Springer-Verlag, pp. 251-260, 1987. [7] G. J. Simmons, “An Introduction to Shared Secret and/or Shared Control and their Application,” in Contemporary Cryptology, The Science of Information Integrity, G. J. Simmons, Ed. NewYork: IEEE Press, pp. 441-497, 1992. [8] R.H. Deng, L. Gong, A. A. Lazar, and W. Guo, “Authenticated Key Distribution and Secure Broadcast Using no Conventional Encryption: A Unified Approach Based on Block Codes,” IEEE GLOBECOM, pp. 1193-1197, 2000. [9] T. ElGamal, ‘A Public-key Cryptosystem and a Signature Scheme Based on Discrete Logarithm,” IEEE Trans. Inform. Theory, Vol. 31, pp. 469-472, 1995. [10] K. J. Tan, H-W. Zhu, and S.J. Gu, “Cheater Identification in (t,n) Threshold scheme, ” Computer Communications, Vol. 22 , pp. 762-765, 1999. [11] Wei-Bin Lee and Chin-Chen Chang, “A Dynamic Secret Sharing Scheme Based on the Factoring and Diffie-Hellman Problem,” IEICE Trans. Fundamentals E81-A (8) pp.1733-1738, 1998. [12] L. Harn, “Efficient Sharing (broadcasting) of Multiple Secrets,” IEE Proc. Comput. Digit. Tech., Vol. 142, No. 3, pp. 237-240, 1995. [13] E. Ayanoglu, C-L I, R.D. Citlin, and J.E. Mazo, “Diversity Coding: Using Error Control for Self-healing in Communication Networks,” Proceedings of IEEE Inform, pp. 95-104, 2003. [14] B. Blakey, G. R. Blakley, A. H. Chan, and J. L. Massey, “Threshold Scheme with Disenrollment,” Advances in Cryptology-Crypto, Springer-Verlag, Berlin, pp. 540-548, 1993. [15] C. Blundo, A. Cresti. D. Santis, and U. Vaccaro, “Fully Dynamic Secret Sharing Schemes,” Advances in Cryptology-crypto, Springer-Verlag, Berlin, pp.110-125, 1994. [16] C. Blundo, D. Santis, D. Crescenoz, A.G. Gaggia, and U. Vaccaro, “Secrets Sharing Schemes,” Advances in Cryptology-Crypto, Springer-Verlag, Berlin, pp.190-198, 1994. [17] C. Cachin, “On-line Secret Sharing,” Cryptography and Coding, Springer-Verlag, Berlin, pp.150-163, 1994. [18] C. C. Chang, H. J. Horug, and D.J. Buehrer, “A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Zie-Welch compression algorithm,” Journal of Information Science and Engineering , Vol. 11, No. 3, pp. 417-431, 1995. [19] W. D. Lin, and J.K. Jan, “An Automatic Signature Scheme Using a Compiler in Distributed Systems,” IEICE Trans. on Communications, Vol.E83-B, No.5, PP.935-941, 2000. [20] W. D. Lin, “EC Transactions Use Different Web-based Platforms,” Lecture Notes in Computer Science, No. 2658, pp1059-1068, 2003 [21] H. Krawczyk, “Secret Sharing Made Short,” Advances in Cryptology-crypto, Springer-Verlag, Berlin, pp.113-138, 1994. [22] R.G.E. Pinch, “On-line Multiple Secret Sharing,” Electronics Letters, pp.1987-1088, 1996. [23] D.R. Stinson, “Cryptography: Theory and Practice,” CRC Press, Boca Raton, 1995. [24] L. Lamport, “Password Authentication with Insecure Communication,” Communication of ACM, Vol. 24, pp.770-772, 1981. [25] E. Okamoto, and K. Tanka, “Identity-based Information Security Managements system for personal computer networks,” IEEE Journal on Selected Areas in Communications, Vol. 7, No. 2, pp. 290-294, 1989. [26] C. C. Chang and T. C. Wu, “Remote Password Authentication with Smart Cards,” IEEE Proceeding, Vol.138, No.3, pp.165-168, 1991. [27] C. C. Chang and S. J. Hwang, “Using Smart Cards to Authenticate Remote Passwords,” Computers and Mathematical Applications, Vol. 26, No. 7, pp. 9-27, 1993. [28] Hung-Min Sun, “An Efficient Remote Use Authentication Scheme using Smart Card,” IEEE Transactions on Consumer Electronics, Vol. 46, pp. 958-961, November, 2000. [29] Shyi-Tsong Wu and Bin-Chang Chieu, “A User Friendly Remote Authentication Scheme with Smart Cards,” Computers and Security, Vol. 22, No. 6, pp. 547-550, 2003. [30] Chi-Yu Liu, Min-Shiang Hwang, Jung-Wen Lo, and Shu-Chen Lin, “Cryptanalysis of A User Friendly Remote Authentication Scheme with Smart Card,” in Proceedings of 14th Information Security Conference, Taiwan, pp. 256-259, June 2004. [31] T. Y. Lin and T. C. Wu, “(t, n)-threshold Verifiable Multi-secret Sharing Scheme based on the Factorization and the Discrete Logarithm Modulo a Composite Problems,” in IEEE Proc., Comput. Digit. Tech., Vol. 146, No. 5, pp. 264-268, May 2001. [32] W. H. He and T. S. Wu, “Comment on Lin-Wu (t, n)-threshold Verifiable Multi-secret Sharing Scheme,” IEEE Proc., Comput. Digit. Tech., Vol. 148, No. 3, pp. 139, May 2001. [33] Chin-Chen Chang and Chao-Wen Chan, “Detecting Dealer Cheating in Secret sharing Systems,” in Proceedings of 24th International Conference on Computer Software and Applications, pp. 449-453, 2000. [34] Chin-Chen Chang, Chu-Hsing Lin, Wei Lee, and Pai-Cheng Hwang, “Secret Sharing with Access Structures in a Hierarchy,” in Proceedings of 18th International Conference on Advanced Information Networking and Applications, Vol. 2, pp. 31-34, 2004. [35] S. L. Ng, “Ideal Secret Sharing Schemes with Multipartite Access Structures,” in IEE Proceedings of Communication, Vol. 153, No. 2, pp. 165-168, April 2006. [36] H. Y. Chien, J. K. Jan, and Y. M. Tseng, “On the Generalized Threshold-Based Secret Sharing Scheme,” 10th National Security Conference, Hwa-Lan Taiwan, pp. 285-290, May 2000. [37] H. Y. Chien, , J. K. Jan, and Y. M. Tseng, “A Practical (t,n) Multi-Secret Sharing Scheme, ” IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, Japan, Vol. E83-A, No.12, pp.2762-2765, Dec. 2000. [38] Ting-Yi Chang, Chou-Chen Yang, and Min-Shiang Hwang., “Threshold Untraceable Signature for Group Communications, ” IEE Proceedings- Communication, Vol. 151, No. 2, p. 179-184, April 2004. [39] Ting-Yi Chang, Chou-Chen Yang, and Min-Shiang Hwang., “Threshold Signature for Group Communications without Shared Distribution Center,” Future Generation Computer Systems, Vol. 20, pp.1013-1021, August 2004. [40] Min-Shiang Hwang, Chin-Chi Lee, and Ting-Yi Chang, “An Elgamal-like Cryptsystem in Computer Networks Using Geometric Properties of Lines,” Journal of Information Science and Engineering, Vol.18, No.3, pp.373-378, 2002 . [41] RSA Laboratories, “What are secret sharing schemes? ”, http://www.rsasecurity.com/rsalabs/node.asp?id=2179. [42] Wikipedia , “Secret Sharing”, http://en.wikipedia.org/wiki/Secret_sharing. [43] M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology - Eurocrypt ''94, Springer-Verlag, pp.1-12, 1994. [44] Y. Frankel, P. Gemmel, P. D. MacKenzie and M. Yung, “Proactive RSA,” Advances in Cryptology - Crypto ''97, Springer-Verlag, pp.440-454, 1997. [45] R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin, “Robust Threshold DSS Signatures,” Advances in Cryptology - Eurocrypt ''96, Springer-Verlag, pp.354-371, 1996. [46] A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk and M. Yung, “Proactive Public Key and Signature Systems,” 1997 ACM Conference on Computers and Communication Security , pp.100-110, 1997. [47] R. Gennaro, A. Herzberg and D. Naor, “Proactive Security: Long-term Protection Against Break-ins,” CryptoBytes Vol.1, No. 3, Spring 1997. [48] J. He and E. Dawson, “Multisecret-sharing Scheme Based on One-way Function,” Electronic Letters, Vol.31, No.2, pp.93-95, Jan. 1995. [49] Y. B. Guo, T. J. Shi, and J. F. Ma, “An Efficient Construction of secret sharing for Generalized adversary Structure and Its Reduction,” Communications, Circuits and Systems, 2004. ICCCAS 2004, Vol. 1, pp.6-10, June 2004. [50] M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology - Eurocrypt ''94, pp.1-12, Springer-Verlag (1994)., 1994. [51] Michael A. Marsh, and Fred B. Schneider, “CODEX: A Robust and Secure Secret Distribution System,” IEEE Transactions on Dependable and Secure computing, Vol.1, No.1, pp.34-47, Jan. 2004. [52] C. H. Lin, W. Lee, and C. S. Chen, “Dynamic Key Generations for Secret Sharing in Access Structures,” in Proceedings of 19th International Conference on Advanced Information Networking and Applications (AINA'05), pp. 127-130, March 25-30, 2005. [53] D. R. Stinson, “Decomposition Constructions for Secret-Sharing Schemes,” IEEE Transactions on Information Theory, Vol.40, No.1, pp.118-125, Jan. 1994. [54] Ahmet M. Eskicioglu and Edward J. Delp, “A Key Transport Protocol Based on Secret Sharing Applications to Information Security,” IEEE Transactions on Consumer Electronics, Vol. 48, No. 4, pp. 816-824, November 2002. [55] Yuanbo Guo and Jianfeng Ma, “An Efficient and Secure Fault-tolerant Conference-Key Distribution Scheme,” IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, pp. 571-575, May 2004. [56] H. H. Cho, Y. H. Park, J. S. Lee, H. S. Jang, and K. H Rhee, “A Proposal of Secure Efficient Dynamic Hierarchical Key Management Structure,” The Second Workshop on Information Security Application, Korea, pp.357-362, 2001. [57] C. H. Lin, “Dynamic Key Management Schemes for Access Control a Hierarchy, ” Computer Communications, No. 20, pp.1381-1385, 1997. [58] C. Charnes, K. Martin, J. Pieprzyk and R. Safavi-Naimi, “Secret Sharing in Hierarchical Groups,” in Proceedings of First International Conference, ICICS'97, pp. 81-85, 1997. [59] G. PremKumer and P. Venkateteram, “Security Management Architecture for Access Control to Network Resources,” IEE Proceedings-Computers and Digital Techniques, Vol.144, No.6, pp.362-370, 1997. [60] C. Y. Lee, Y. S. Yeh, and D. J. Chen, “A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet, ” IEICE Transaction on Information and Systems, VOL. E83-D, No. 2, pp. 190-199, Feb, 2000. [61] C. S. Laih, M. D. Lin, and T. Hwang, “A new Threshold Scheme with Detecting and Exposing Forged Shadows,” International Symposium on Information Theory and Its Applications, Hawaii, USA, pp.1053-1056, Nov. 1990. [62] Masayuki Numao, “A Secure Key Registration System Based on Proactive Secret Sharing Scheme,” International Symposium on Autonomous Decentralized Systems 1999, ISADA 1999, Tokyo, Japan, pp.230-237, 1999. [63] S. L. Ng, “On the Composition of Matriods and Ideal Secret Sharing Schemes,” Designs, Codes and Cryptography, Vol. 24, pp. 49-67, 2001. [64] E. F. Brickell and D. M. Davenport, “On the Classification of Ideal Secret Sharing Schemes,” J. Cryptology, Vol. 4, No. 2, pp. 123--124, 1991. [65] Suranjan Pramanik and sharmbha Upadhyaya, “VPSS: A Verifiable Proactive Secret Sharing Scheme in Distributed Systems,” Military Communications Conference, 2003. MILCOM 2003, Vol. 2, pp. 826-831, 2003. [66] S. L. Ng, “A representation of a Family of Secret Sharing Matroids,” Designs, Codes and Cryptography, Vol. 30, pp. 5-19, 2003.
摘要: 隨著網際網路的普及以及電腦與通訊技術的不斷進步,人們可以非常方便地透過公共網路,存取各種網路資源與傳送具有敏感性的資料。因此,也產生了許多與網路安全相關的重要議題,其中之一就是秘密訊息的分享。尤其是當人類生活中,有許多部分愈來愈仰賴電子通訊,使用電子方式來儲存非常重要的檔案也愈來愈普及了。 所以在一個分散式的網路系統中,如何對於系統內的各種檔案與訊息,依據各種不同的等級、類別以及用途,運用不同的密鑰來加以保護與分享,已達到更安全的分享資源之目標,也就愈來愈趨重要了。因此,如何設計一個同時具有安全性與效率的秘密分享協定,是一件非常重要的研究課題。在本論文中,我們將針對多重秘密訊息分享方法與機制來加以研究與探討。 秘密訊息分享,就是指在一個分散式系統中,當一群合法的使用者想要分享一個共同的主密鑰時,密鑰管理者(dealer)會將密鑰分成n份不同的次密鑰,然後將這些次密鑰分給每一位參與者(participant),只有當參與者人數至少達到某一個門檻值(t)的時候,才能將主密鑰推導出來。這個方法是在西元1979年由Blakley[1]與shamir[2]所分別提出的,接著藉由他們所提出來的觀念, 便陸陸續續有許多論文提出了許多不同的方法。 在本論文中,我們提出了一個多重秘密分享的方法,讓參與者只需要持有他自己的私有密鑰,便能夠很安全地與其他參與者共同來分享他們的秘密訊息,並且可以驗證其他參與者身分的合法性。而有關於所分享的多重秘密訊息的許多相關資訊,都可以很方便及安全地公佈在電子公佈欄上,不需要透過秘密通道來加以傳送。 本論文中,我們是運用系統化區塊碼(systematic block codes)的原理,來設計一個系統化區塊碼生成陣列(systematic block generator matrix) G(2m+1, m+1),並同時結合shamir秘密分享與RSA公開密鑰加密系統的觀念,提出的一個多重秘密分享機制,以達到提供一個具有動態與即時地分享多重秘密訊息的目標。 而我們所提出的方法具有容易地動態產生存取結構以及即時地更新存取結構的陣列,減少訊息溝通負載,具有彈性化的更新存取結構方式,以及非常安全地驗證分享者身份的合法性等優點。
Authenticated key distribution is one of the most important mechanisms for providing secure services in networking environments. When a group of people share a common key in a distributed system, it is highly desirable to have robust key management such that a maximum level of secrecy (privacy) can be achieved while allowing some faults (resiliency) to be tolerated. Secret sharing schemes help users to share a secret in a group. A secret sharing scheme is a method that allows a secret to be shared among a finite set of participants in such a way that only qualified subsets of participants can recover it. In this dissertation, the proposed scheme permits each participant to share secrets with other participants by holding only his secret key and dynamically change the access structure on-line for distributed systems. Only the qualified subset of participants can obtain the shared secret in a distributed system. Each participant is allowed to check whether another participant has provided the true information in the recovery phase or not. We propose a new solution based on systematic block codes that can dynamically change the access structure with m shared secrets. We designed a systematic block code generator matrix G(2m+1, m+1) that can be pre-computed and implemented on VLSI chips. The security of our scheme is the same as that of the RSA cryptosystem and Shamir's (t, n) threshold scheme. Our scheme has the advantages of easy generator matrix construction, smaller communication overhead and nondisclosure of user secrets after multiple secret reconstruction phases. We improve the process efficiency and security for multiple secret sharing in distributed systems.
URI: http://hdl.handle.net/11455/17626
其他識別: U0005-2408200601100300
文章連結: http://www.airitilibrary.com/Publication/alDetailedMesh1?DocID=U0005-2408200601100300
顯示於類別:應用數學系所

文件中的檔案:
沒有與此文件相關的檔案。


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。