CN105071938A - Group authentication method based on threshold secret sharing - Google Patents

Group authentication method based on threshold secret sharing Download PDF

Info

Publication number
CN105071938A
CN105071938A CN201510416888.1A CN201510416888A CN105071938A CN 105071938 A CN105071938 A CN 105071938A CN 201510416888 A CN201510416888 A CN 201510416888A CN 105071938 A CN105071938 A CN 105071938A
Authority
CN
China
Prior art keywords
group
secret
user
certification
certificate server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510416888.1A
Other languages
Chinese (zh)
Other versions
CN105071938B (en
Inventor
苗付友
何晓婷
季洋洋
顾为玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology of China USTC
Original Assignee
University of Science and Technology of China USTC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology of China USTC filed Critical University of Science and Technology of China USTC
Priority to CN201510416888.1A priority Critical patent/CN105071938B/en
Publication of CN105071938A publication Critical patent/CN105071938A/en
Application granted granted Critical
Publication of CN105071938B publication Critical patent/CN105071938B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a group authentication method based on threshold secret sharing. The group authentication method comprises the following steps of marking n group members as [Ui, i=1,2,...,n]; generating and distributing two secret shares (s1i,s2i) by a secret distributor SD for each group member Ui by means of a (t,n) threshold secret sharing solution; generating and distributing 2*(t-1) secret shares (s1i,s2i) for a group authentication server AS, i=n+1,..., n+t-1; in authentication, if authentication to m users is required, generating two tokens by each authenticated user Ui by means of the secret shares (s1i,s2i) of his own; and performing unified authentication or one-by-one authentication on m users to be authenticated by the group authentication server. The group authentication method can be used for verifying whether all users are legal in one time, and furthermore can quickly and effectively determine all non-group-members on condition that non-group-members exist.

Description

A kind of group authentication method based on threshold secret sharing
Technical field
The present invention relates to field of information security technology, particularly relate to a kind of group authentication method based on threshold secret sharing.
Background technology
At present, (t, n) basic thought of threshold secret sharing is that a Secret sharing is become n secret shadow, and each share is distributed to a participant, only have the individual or t of t (t≤n) above participant's cooperation could Restore Secret, being less than t participant cannot Restore Secret, and wherein t is threshold value.(t, n) threshold secret sharing scheme has a variety of implementation, and what be wherein most widely used is exactly Shamir secret sharing scheme:
Program supposition D is secret distributor, and n is the number of participant, and t is threshold value, and p is Big prime and much larger than n; Secret space and share space are finite field gf (p), and (t, n) threshold secret sharing scheme of Shamir is divided into two parts:
Part I, secret distribution phase:
(1) t-1 order polynomial f (x): f (the x)=a on secret distributor D Stochastic choice GF (p) t-1x t-1+ ... + a 2x 2+ a 1x+a 0modp, wherein a 0=f (0)=s, s is secret, and f (x) maintains secrecy by D;
(2) D selects n mutually different nonzero element x in finite field gf (p) l, x 2..., x n, calculate s i=f (x i), 1≤i≤n.
(3) by s i, (l≤i≤n) key distribution is to participant U i, value x iu ipublic information, s ifor U isecret shadow.
Part II, secret reconstruction stage:
Any m, (n>=m>=t), individual participant, such as, { U 1, U 2..., U m, their secret shadow { s can be utilized l, s 2..., s mby Lagrange interpolation formula modp calculates f (0) and recovers shared secret s.
Further, based in the scheme of threshold secret sharing, group certification is in order to verify whether a user belongs to certain predefined group, and of the prior art group of certificate scheme is:
(1) secret shadow generates:
Suppose total n group membership, be designated as { U i| i=1,2 ..., n}, Group administrators selects the individual t-1 order polynomial of k (kt>n-1) on GF (p), f l(x), l=1,2 ..., k, wherein p is Big prime, utilizes k multinomial to each participant U igenerate k secret shadow f l(x i), l=1,2 ..., k, wherein x i, i=1,2 ..., k is public information.For arbitrary secret s, keeper finds k to (w j, d j), j=1,2 ... k, order open w j, d j, j=1,2 ... k, and the one-way Hash value H (s) of s, wherein H (.) is an one-way Hash function.
(2) secret reconstruct:
In authentication phase, if there be m user to participate in certification, each user U i, i=1,2 ... m utilizes k the secret shadow of oneself to generate token c i = Σ j = 1 k d j f j ( x i ) Π r = 1 , r ≠ i m ( w j - x r ) / ( x i - x r ) mod p And token is distributed to other participants, member collects a neat m c icalculate afterwards if H (s)=H (s '), then m member is all legal; If H (s) ≠ H (s '), illegal member must be had in group.
In above-mentioned group of verification process, Group administrators will select k multinomial and generate k secret shadow for each group membership, the size of k is limited by thresholding t and total group membership's number n simultaneously, i.e. kt>n-1, thus scheme underaction, also makes the distribution procedure of multinomial management and secret shadow complicated simultaneously; In addition, whether the program can all users of disposable checking be all legal group membership, but if there is disabled user (non-group membership) to exist, the program cannot determine its quantity, more cannot determine concrete disabled user.Just because of the scheme multinomial complex management of above-mentioned prior art and do not have to solve the problem of non-group membership of finding fast, make such scheme can only be applied to the preliminary treatment in early stage of group certification, its range of application and practicality reduce greatly.
Summary of the invention
The object of this invention is to provide a kind of group authentication method based on threshold secret sharing, utilize the method not only can all users of disposable checking whether all legal, can also fast and effeciently determine all non-group memberships when there being non-group membership to exist.
Based on a group authentication method for threshold secret sharing, described method comprises:
N group membership is designated as { U i| i=1,2 ..., n};
Utilize (t, n) threshold secret sharing scheme to each group membership U by secret distributor SD igenerate and distribute two secret shadow (s 1i, s 2i), i=1,2 ..., n;
Generate to group certificate server AS and distribute the individual secret shadow (s of 2* (t-1) 1i, s 2i), i=n+1, n+2 ..., n+t-1, and generate two secret s a, s b, wherein, s a=f ({ s 1i| i ∈ I h), s b=f ({ s 2i| i ∈ I h), f is secret reconstruction function, I hfor 1,2 ..., the subset comprising h element of n}, wherein t<=h<=n; With seasonal s 1and s 2be respectively s aand s blinear combination;
Secret distributor discloses several to (a 1, b 1), (a 2, b 2), and s 1, s 2one-way Hash value H (s 1), H (s 2);
When carrying out certification, if group certificate server needs to carry out certification to m user, then each certified user U iutilize the secret shadow s of oneself 1i, s 2igenerating 2 tokens is:
c 1i=g(a 1,b 1,s 1i,s 2i,{U j|j∈I m},{U k|k=n+1,n+2,…,n+t-1},r 1i),
C 2i=g (a 2, b 2, s 1i, s 2i, U i, { U k| k=n+1, n+2 ..., n+t-1}, r 2i); Wherein, 1≤m≤n, r 1i, r 2ifor random number, g is token generating function;
And the token of generation is submitted to group certificate server AS by overt channel;
Unified certification is carried out to a m to be certified user, to judge whether there is disabled user by group certificate server; If there is disabled user, then certification is one by one used to find out all concrete disabled users.
As seen from the above technical solution provided by the invention, utilize the method not only can all users of disposable checking whether all legal, can also fast and effeciently determine all non-group memberships when there being non-group membership to exist.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme of the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 provides by the embodiment of the present invention group authentication method schematic flow sheet based on threshold secret sharing;
Fig. 2 is secret shadow distribution schematic diagram in example of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on embodiments of the invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to protection scope of the present invention.
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in further detail, be illustrated in figure 1 the embodiment of the present invention group authentication method schematic flow sheet based on threshold secret sharing is provided, include a secret distributor (SD in this scenario, ShareDistributor), a group certificate server (AS, and n group membership { U AuthenticationServer), i| i=1,2 ... n}, wherein communicated by overt channel between AS with each certified user, receive the authentication token of certified user, to complete the certification to each user, and there is safe lane between SD and AS and between SD and each member, SD distributes secret shadow by safe lane to AS and each group membership, with reference to figure 1, described group of authentication method comprises:
Step 11: carry out initialization, is designated as { U by n group membership i| i=1,2 ..., n};
Step 12: utilize (t, n) threshold secret sharing scheme to each group membership U by secret distributor SD igenerate and distribute two secret shadow (s 1i, s 2i), i=1,2 ..., n;
Step 13:SD generates for organizing certificate server AS and distributes the individual secret shadow (s of 2* (t-1) 1i, s 2i), i=n+1, n+2 ..., n+t-1, SD generate two secret s a, s b;
In this step, s a=f ({ s 1i| i ∈ I h), s b=f ({ s 2i| i ∈ I h), f is secret reconstruction function, I hfor 1,2 ..., the subset comprising h element of n}, wherein t<=h<=n;
Step 14: make s 1and s 2be respectively s aand s blinear combination, secret distributor SD discloses several to (a 1, b 1), (a 2, b 2), and s 1, s 2one-way Hash value H (s 1), H (s 2);
In this step, with seasonal s 1and s 2be respectively s aand s blinear combination, such as s 1=a 1s a+ b 1s b, s 2=a 2s a+ b 2s b;
After this verification process no longer needs the participation of secret distributor SD.
Step 15: when carrying out certification, if group certificate server AS needs to carry out certification to m user, then each certified user U iutilize the secret shadow s of oneself 1i,s 2igenerate 2 tokens;
In this step, concrete 2 tokens generated are:
c 1i=g(a 1,b 1,s 1i,s 2i,{U i|i∈I m},{U k|k=n+1,n+2,…,n+t-1},r 1i),
C 2i=g (a 2, b 2, s 1i, s 2i, U i, { U k| k=n+1, n+2 ..., n+t-1}, r 2i); Wherein, 1≤m≤n, r 1i, r 2ifor random number, g is token generating function;
Step 16: the token of generation is submitted to group certificate server AS by overt channel;
Step 17: carry out unified certification to a m to be certified user by group certificate server AS, to judge whether there is disabled user, if there is disabled user, then uses certification one by one to find out concrete disabled user.
In this step, the method for specifically carrying out unified certification and certification is one by one:
First, when carrying out unified certification, group certificate server AS utilizes 2* (t-1) the individual secret shadow of oneself to generate corresponding token:
C as=g (a 1, b 1, { U i| i ∈ I m, { (s 1k, s 2k, U k| k=n+1, n+2 ..., n+t-1}, r j), r jfor random number;
Described group of certificate server utilizes formula s 1'=f ' ({ c 1i| i ∈ I m, c as) calculate s 1' and H (s 1'), f ' is another secret reconstruction function;
If H is (s 1)=H (s 1'), then all authentic m users are by certification, are group membership;
If H is (s 1) ≠ H (s 1'), then at least there is a user is non-group membership, carries out certification one by one again, specifically comprise by described group of certificate server to all m user:
For each certified user U iregenerate 1 token c i=g (U i, a 2, b 2, { (s 1k, s 2k, U k| k=n+1, n+2 ..., n+t-1}, r i), g is token generating function, r ifor random number;
Again by described group of authentication server computes s 2'=f ' (c 2i, c i) and H (s 2'), wherein f ' is secret reconstruction function;
If H is (s 2)=H (s 2'), then this carries out the U of certification ibe legal group membership, otherwise be non-group membership.
By above-mentioned group authentication method, after the disposable submission token of each user, both can unify to organize certification to all users, also can carry out certification one by one to each user separately; Namely this group certificate scheme not only can all group memberships of disposable checking whether all legal, and when there being illegal member to exist, also can determine all illegal users fast.
Be described in detail to above-mentioned authentication method with concrete example below, this example is to realize above-mentioned group of certificate scheme based on Shamir ' s (t, n) threshold secret sharing, specific as follows:
First carry out initialization, in Scenario, total n group membership, is designated as { U i| U i∈ GF (p), U i≠ 0, U i≠ 1, i=1,2 ..., n}, wherein p is a Big prime, and GF (p) is a finite field.Q is another big integer, and p>nq 2+ q.
Secret distributor SD selects two t-1 order polynomials in GF (p) with a i, b i∈ GF (p) is each group membership U igenerate 2 secret shadow f 1(U i), f 2(U i), i=1,2 ..., n, and by safe lane by f 1(U i), f 2(U i) be distributed to U in confidence i;
SD is group certificate server AS generation 2* (t-1) individual secret shadow simultaneously, f 1(U k), f 2(U k), k=n+1, n+2 ..., n+t-1;
Then, SD goes up Stochastic choice two number to (a at GF (p) 1, b 1), (a 2, b 2), form two secret s 1={ a 1f 1(0)+b 1f 2(1) } modp, s 2={ a 2f 1(0)+b 2f 2(1) } modp, makes s 1and s 2all on Zq.
Finally, SD calculates s 1and s 2one-way Hash value H (s 1), H (s 2), and open (a 1, b 1), (a 2, b 2), one-way Hash function H (.), secret shadow distribution figure as shown in Figure 2, in Fig. 2: secret distributor SD is respectively for each group membership U igenerate (s 1i, s 2i), i=1,2 ..., n.
Then first carry out unified certification by group certificate server AS, suppose the individual user { U of m (m>=1) i| U i∈ GF (p), i ∈ I mparticipate in certification, the user U of each participation certification icalculate 2 tokens:
c 1 i = ( a 1 f 1 ( U i ) &Pi; j &Element; I m , j &NotEqual; i - U j U i - U j &Pi; k = n + 1 n + t - 1 - U k U i - U k + b 1 f 2 ( U i ) &Pi; j &Element; I m , j &NotEqual; i 1 - U j U i - U j &Pi; k = n + 1 n + t - 1 1 - U k U i - U k + r 1 i q ) mod p ,
c 2 i = ( a 2 f 1 ( U i ) &Pi; k = n + 1 n + t - 1 - U k U i - U k + b 2 f 2 ( U i ) &Pi; k = n + 1 n + t - 1 1 - U k U i - U k + r 2 i q ) mod p , I=1,2 ... m, wherein, r 1i, r 2iu ithe random number that Zq selects, U iabove-mentioned two tokens are sent to group certificate server AS by overt channel.
Organize the secret shadow computational token that certificate server AS utilizes oneself:
c a s = &Sigma; i = n + 1 n + t - 1 &lsqb; a 1 f 1 ( U i ) &Pi; k = n + 1 , k &NotEqual; i n + t - 1 - U k U i - U k &Pi; j &Element; I m - U j U i - U j + b 1 f 2 ( U i ) &Pi; k = n + 1 , k &NotEqual; i n + t - 1 1 - U k U i - U k &Pi; j &Element; I m 1 - U j U i - U j &rsqb; + r q ( mod p ) ,
Wherein, r is the random number selected on Zq.
Group certificate server AS utilizes the token c of each user received i(i ∈ I m) and oneself token c asrestore Secret s 1 &prime; = ( &Sigma; i &Element; I m c 1 i + c a s ) mod p mod q .
If H (s ' 1)=H (s 1), then all users pass through certification;
If H (s ' 1) ≠ H (s 1), then must there is disabled user (i.e. non-group membership) in group, and then carry out certification one by one, if there is disabled user, then AS can carry out certification one by one to each user under without the need to further interaction scenario, and concrete proof procedure is as follows:
AS is to user U iwhen carrying out certification, the secret shadow of oneself is utilized to generate token c i,
c i { &Sigma; j = n + 1 n + t - 1 &lsqb; a 2 f 1 ( U j ) &Pi; k = n + 1 , k &NotEqual; j n + t - 1 - U k U j - U k - U i U j - U i + b 2 f 2 ( U j ) &Pi; k = n + 1 , k &NotEqual; j n + t - 1 1 - U k U j - U k 1 - U i U j - U i &rsqb; + r i q } mod p
Wherein, r ifor certain random number of AS uniform design on Zq.
Then, AS calculates s ' 2=(c 2i+ c i) modpmodq and H (s ' 2);
If H (s ' 2)=H (s 2), then U ifor group membership, otherwise U ifor disabled user (non-group membership), the method can verify all disabled users within o (n) time.
The scheme of above-described embodiment is to realize based on Shamir ' s (t, n) threshold secret sharing, can realize accordingly, do not limit here in specific implementation based on any (t, n) threshold secret sharing scheme.
In sum, the group authentication method tool based on threshold secret sharing of the present invention has the following advantages:
1) by secret shadow randomization is constructed group authentication token, avoid each group membership and hold too much secret shadow problem, reduce the complexity of token structure, improve the flexibility of scheme;
2) program is after the disposable submission token of each user, both can unify to organize certification to user, and also can carry out certification one by one to each user separately;
3) program can within O (1) time all group memberships of fast verification whether legal, if there is illegal member, server can determine all illegal users fast within O (n) time;
4) each group membership only needs to hold two secret shadow, reduces the distribution of secret shadow and the cost of management;
5) program does not rely on any public key algorithm, and the group certificate scheme relatively based on PKI is more safe and reliable.
The above; be only the present invention's preferably embodiment, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; the change that can expect easily or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claims.

Claims (2)

1. based on a group authentication method for threshold secret sharing, it is characterized in that, described method comprises:
N group membership is designated as { U i| i=1,2 ..., n};
Utilize (t, n) threshold secret sharing scheme to each group membership U by secret distributor SD igenerate and distribute two secret shadow (s 1i, s 2i), i=1,2 ..., n;
Secret distributor SD generates for organizing certificate server AS and distributes the individual secret shadow (s of 2* (t-1) 1i, s 2i), i=n+1, n+2 ..., n+t-1, and secret distributor SD generates two secret s a, s b, wherein, s a=f ({ s 1i| i ∈ I h), s b=f ({ s 2i| i ∈ I h), f is secret reconstruction function, I hfor 1,2 ..., the subset comprising h element of n}, wherein t<=h<=n;
Make s 1and s 2be respectively s aand s blinear combination, secret distributor SD discloses several to (a 1, b 1), (a 2, b 2), and s 1, s 2one-way Hash value H (s 1), H (s 2);
When carrying out certification, if group certificate server AS needs to carry out certification to m user, then each certified user U iutilize the secret shadow s of oneself 1i,s 2igenerating 2 tokens is:
c 1i=g(a 1,b 1,s 1i,s 2i,{U i|i∈I m},{U k|k=n+1,n+2,…,n+t-1},r 1i),
C 2i=g (a 2, b 2, s 1i, s 2i, U i, { U k| k=n+1, n+2 ..., n+t-1}, r 2i); Wherein, 1≤≤ m≤n, r 1i, r 2ifor random number, g is token generating function;
And the token of generation is submitted to group certificate server AS by overt channel;
By group certificate server AS, unified certification is carried out to a m to be certified user, to judge whether there is disabled user, if there is disabled user, then use certification one by one to find out all concrete disabled users.
2. according to claim 1 based on the group authentication method of threshold secret sharing, it is characterized in that, describedly by group certificate server AS, unified certification is carried out to a m to be certified user, to judge whether there is disabled user, if there is disabled user, then use certification one by one to find out concrete disabled user, specifically comprise:
When carrying out unified certification, group certificate server utilizes 2* (t-1) the individual secret shadow of oneself to generate corresponding token:
C as=g (a 1, b 1, { U i| i ∈ I m, { (s 1k, s 2k, U k| k=n+1, n+2 ..., n+t-1}, r as), r asfor random number;
Described group of certificate server utilizes formula s 1'=f ' ({ c 1i| i ∈ I m, c as) calculate s 1' and H (s 1'), f ' is secret reconstruction function;
If H is (s 1)=H (s 1'), then all authentic m users are by certification, are group membership;
If H is (s 1) ≠ H (s 1'), then at least there is a user is non-group membership, carries out certification one by one again, specifically comprise by described group of certificate server to all m user:
For U iregenerate 1 token c i=g (U i, a 2, b 2, { (s 1k, s 2k, U k| k=n+1, n+2 ..., n+t-1}, r i), g is token generating function, r ifor random number;
Again by described group of authentication server computes s 2'=f ' (c 2i, c i) and H (s 2'), wherein f ' is secret reconstruction function;
If H is (s 2)=H (s 2'), then this certified user U ibe legal group membership, otherwise be non-group membership.
CN201510416888.1A 2015-07-14 2015-07-14 A kind of group authentication method based on threshold secret sharing Active CN105071938B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510416888.1A CN105071938B (en) 2015-07-14 2015-07-14 A kind of group authentication method based on threshold secret sharing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510416888.1A CN105071938B (en) 2015-07-14 2015-07-14 A kind of group authentication method based on threshold secret sharing

Publications (2)

Publication Number Publication Date
CN105071938A true CN105071938A (en) 2015-11-18
CN105071938B CN105071938B (en) 2018-08-21

Family

ID=54501225

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510416888.1A Active CN105071938B (en) 2015-07-14 2015-07-14 A kind of group authentication method based on threshold secret sharing

Country Status (1)

Country Link
CN (1) CN105071938B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656512A (en) * 2017-01-17 2017-05-10 武汉理工大学 SM2 digital signature generation method and system supporting threshold password
CN106685657A (en) * 2017-01-20 2017-05-17 国网江苏省电力公司信息通信分公司 Template method for establishing group secret key in dynamic adhoc network
CN106850198A (en) * 2017-01-16 2017-06-13 武汉理工大学 SM2 digital signature generation method and system based on the collaboration of many devices
CN109274492A (en) * 2018-09-30 2019-01-25 中国科学技术大学 From the close coupling privacy sharing method of safety
CN110555933A (en) * 2019-07-31 2019-12-10 中钞信用卡产业发展有限公司杭州区块链技术研究院 Electronic voting method, device, equipment and computer storage medium
US10803184B2 (en) 2019-08-09 2020-10-13 Alibaba Group Holding Limited Generation of a model parameter
CN112291061A (en) * 2020-10-21 2021-01-29 中国科学技术大学 Trust management method based on distributed secret sharing under large-scale Internet of things scene
WO2021027259A1 (en) * 2019-08-09 2021-02-18 创新先进技术有限公司 Method and apparatus for determining model parameters, and electronic device
CN112970236A (en) * 2018-11-15 2021-06-15 维萨国际服务协会 Collaborative risk-aware authentication
CN114079566A (en) * 2020-08-05 2022-02-22 阿里巴巴集团控股有限公司 Internet of things equipment authentication method, equipment and storage medium
CN116208345A (en) * 2023-05-04 2023-06-02 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Group authentication method based on secret sharing and related equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100287366A1 (en) * 2007-02-02 2010-11-11 Toshinori Araki Distributed information generation apparatus, reconstruction apparatus, reconstruction result verification apparatus, and secret information distribution system, method, and program
CN101908961A (en) * 2010-07-29 2010-12-08 北京交通大学 Multi-party secret handshaking method in short key environment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100287366A1 (en) * 2007-02-02 2010-11-11 Toshinori Araki Distributed information generation apparatus, reconstruction apparatus, reconstruction result verification apparatus, and secret information distribution system, method, and program
CN101908961A (en) * 2010-07-29 2010-12-08 北京交通大学 Multi-party secret handshaking method in short key environment

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
LEIN HARN: "Generalised cheater detection and identification", 《IET INFORMATION SECURITY》 *
LEIN HARN: "Group Authentication", 《IEEE TRANSACTION ON COMPUTERS》 *
谢琪,于秀源: "一种安全有效的(t,n)多秘密共享认证方案", 《电子与信息学报》 *

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850198B (en) * 2017-01-16 2019-10-25 武汉理工大学 SM2 digital signature generation method and system based on the collaboration of more devices
CN106850198A (en) * 2017-01-16 2017-06-13 武汉理工大学 SM2 digital signature generation method and system based on the collaboration of many devices
CN106656512A (en) * 2017-01-17 2017-05-10 武汉理工大学 SM2 digital signature generation method and system supporting threshold password
CN106656512B (en) * 2017-01-17 2019-07-09 武汉理工大学 Support the SM2 digital signature generation method and system of threshold cryptography
CN106685657A (en) * 2017-01-20 2017-05-17 国网江苏省电力公司信息通信分公司 Template method for establishing group secret key in dynamic adhoc network
CN106685657B (en) * 2017-01-20 2019-06-18 国网江苏省电力公司信息通信分公司 A kind of template method for establishing group's code key in dynamic ad hoc network
CN109274492B (en) * 2018-09-30 2020-08-25 中国科学技术大学 Self-secure tightly coupled secret sharing method
CN109274492A (en) * 2018-09-30 2019-01-25 中国科学技术大学 From the close coupling privacy sharing method of safety
CN112970236A (en) * 2018-11-15 2021-06-15 维萨国际服务协会 Collaborative risk-aware authentication
US11895113B2 (en) 2018-11-15 2024-02-06 Visa International Service Association Collaborative risk aware authentication
CN110555933A (en) * 2019-07-31 2019-12-10 中钞信用卡产业发展有限公司杭州区块链技术研究院 Electronic voting method, device, equipment and computer storage medium
CN110555933B (en) * 2019-07-31 2021-04-30 中钞信用卡产业发展有限公司杭州区块链技术研究院 Electronic voting method, device, equipment and computer storage medium
US10803184B2 (en) 2019-08-09 2020-10-13 Alibaba Group Holding Limited Generation of a model parameter
WO2021027259A1 (en) * 2019-08-09 2021-02-18 创新先进技术有限公司 Method and apparatus for determining model parameters, and electronic device
CN114079566A (en) * 2020-08-05 2022-02-22 阿里巴巴集团控股有限公司 Internet of things equipment authentication method, equipment and storage medium
CN112291061A (en) * 2020-10-21 2021-01-29 中国科学技术大学 Trust management method based on distributed secret sharing under large-scale Internet of things scene
CN112291061B (en) * 2020-10-21 2022-03-01 中国科学技术大学 Trust management method based on distributed secret sharing under large-scale Internet of things scene
CN116208345A (en) * 2023-05-04 2023-06-02 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Group authentication method based on secret sharing and related equipment
CN116208345B (en) * 2023-05-04 2023-08-22 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Group authentication method based on secret sharing and related equipment

Also Published As

Publication number Publication date
CN105071938B (en) 2018-08-21

Similar Documents

Publication Publication Date Title
CN105071938A (en) Group authentication method based on threshold secret sharing
CN105939191B (en) The client secure De-weight method of ciphertext data in a kind of cloud storage
Libert et al. Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares
CN105491006B (en) Cloud outsourcing key sharing means and method
CN105827402B (en) A kind of distribution is open to can verify that random digit generation method
Baron et al. How to withstand mobile virus attacks, revisited
Guo et al. An authenticated group key distribution protocol based on the generalized Chinese remainder theorem
CN103563288B (en) Single-round password-based key exchange protocols
CN100542091C (en) A kind of key generation method and system based on identity
CN109600233A (en) Group ranking mark based on SM2 Digital Signature Algorithm signs and issues method
CN106850229B (en) SM2 digital signature generation method and system based on product secret division
CN103259650A (en) Fair and rational multi-secret sharing method for honest participants
CN101425902A (en) Threshold digital signature method and system having forward security
Phan et al. Decentralized dynamic broadcast encryption
Teng et al. A provable authenticated certificateless group key agreement with constant rounds
TW202034656A (en) Method for generating secure randomness on blockchain
CN103780386B (en) Blind signature method based on identity and device thereof
CN101908961B (en) Multi-party secret handshaking method in short key environment
CN109447634A (en) A kind of code key update method and block chain account management method using this method of locking an account
Gokhale et al. Distributed authentication for peer-to-peer networks
CN103957101B (en) Group key establishing method in group communication
Yu et al. Certificateless threshold signcryption scheme with secret sharing mechanism
CN100550726C (en) A kind of distribution type dynamic secret key management method
Zhang et al. Data owner based attribute based encryption
CN103490890A (en) Combination public key authentication password method based on conic curves

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant