CN102857339A - Secret distribution sharing and recovery recombining method based on sequences - Google Patents
Secret distribution sharing and recovery recombining method based on sequences Download PDFInfo
- Publication number
- CN102857339A CN102857339A CN2012103359869A CN201210335986A CN102857339A CN 102857339 A CN102857339 A CN 102857339A CN 2012103359869 A CN2012103359869 A CN 2012103359869A CN 201210335986 A CN201210335986 A CN 201210335986A CN 102857339 A CN102857339 A CN 102857339A
- Authority
- CN
- China
- Prior art keywords
- secret
- share
- reconstruct
- order
- described secret
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a secret distribution sharing and recovery recombining method based on sequences, which needs to adopt a correct sequence to recombine and recover various secret portions obtained after splitting to recover original secrets; any one false sequence combination can cause the failure of recovering the secret, so that even the attacker gets all portions, the original secret still cannot be illegally recovered through calculation; and the security of the secret is effectively ensured.
Description
Technical field
The present invention relates to field of information security technology, be specially based on the secret distribution of order and share and recover recombination method.
Background technology
At present, original secret is often taken care of by a plurality of personnel through each share that obtains after splitting, in the time of the original secret of needs, then each custodial staff provides several essential shares to recomputate and obtains original secret, this also is the basic thought of threshold schemes technology, but in this process, each necessary fractionation share may be leaked in the process or the custodial staff gangs up and causes original secret illegally to be recovered in keeping.
Summary of the invention
For the problems referred to above, the invention provides based on the secret distribution of order and share and recover recombination method, even can making the assailant obtain all shares, it also can't recover original secret by calculating privately afterwards, effectively guaranteed secret fail safe.
Its technical scheme is such: it is characterized in that: it comprises following operating procedure:
(1), definition:
Define secret k, described secret k is divided into some shares
, wherein
,
Represent that described secret k splits into
Data total collection after the individual share is with described set
In each share be presented to respectively
Individual personnel take care of, wherein
, and the secret number that each personnel obtains is
Individual, wherein
If the necessary share set of the described secret k of reconstruct is provided
, then can the described secret k of reconstruct; If provide
, then can not the described secret k of reconstruct; And in the described secret of reconstruct
Process in,
Be the orderliness requirement, running counter to the order of making an appointment then can not the described secret k of reconstruct, wherein subscript
Be natural number, be illustrated in the certain share number that the described secret k of reconstruct needs, that meet this definition is exactly order threshold schemes (k, n, t, m, p);
(2), split:
Described secret k uses Lagrange interpolation polynomial to carry out function
Split computing and obtain each share
, and calculate each multinomial
, the described multinomial that obtains
Be stored in trusted party, file layout is:
Subscript wherein
Respectively to represent
Required share number in the described secret k order of layer reconstruct,
For the described secret k of reconstruct must experience the combination number of plies, any described share after splitting
Be distributed to each validated user keeping;
(3), recover:
The definition counting variable uses binary operation to calculate described share according to the order of defined
Reconstruct behind the combinatorial operation is secret
, then judge the described counting variable number of definition and the certain share number that needs at the described secret k of reconstruct
Whether identical, if identical then described reconstruct is secret
Be exactly described secret k, if different, it is secret then to continue to use binary operation to calculate described reconstruct
Until draw final described secret k;
(4), safety analysis:
Utilizing computing formula to derive draws:
,
For
The combination form number of individual share reconstruct order,
Be
Individual share is participated in the total number of assembled arrangement that order reconstruct needs, and draws
Value with
Growth and the factorial rank increases.
It is further characterized in that: described step 3 also comprises:
Wherein
,
Computing is binary operator,
For each is listed as the set of the share after described secret k splits;
(3.4), judge
Whether set up, if set up then
Be exactly described secret k, algorithm finishes; If
Be false, then continue to jump to described step (3.2) and continue this algorithm, until calculate described secret k.
The invention has the beneficial effects as follows that the secret number that each personnel obtains in these threshold schemes is
, and arbitrarily personnel obtain this
The reconstruct of individual share possibility full entry, may all not participate in reconstruct yet, perhaps part is participated in restructuring procedure, the assailant does not also know in addition on earth for how many shares, even know the number of members of keeping share, but do not know the number of all shares, thereby increased the difficulty that the assailant obtains enough shares, pass through simultaneously safety analysis, participate in the total number of assembled arrangement that order reconstruct needs
Be with
Growth and the factorial rank increases, even the assailant has grasped all fractionation shares, but owing to attempt one by one all
Individual number of combinations is impossible, and the order that each share participates in reconstruct is stored in the trusted party, permission without trusted party after the personnel that effectively prevented the secret share of each legal keeping gang up illegally recovers original secret privately, greatly improve secret fail safe, can be widely used in each security fields.
Description of drawings
Fig. 1 is definition procedure flow chart of the present invention;
Fig. 2 is recovery process flow chart of the present invention;
Fig. 3 is that secret share is analyzed schematic diagram;
Fig. 4 is that secret share is analyzed schematic diagram;
Fig. 5 is that secret share is analyzed schematic diagram.
Embodiment
As shown in Figure 1 and Figure 2, the present invention includes following operating procedure:
(1), definition:
Define secret k, secret k is divided into some shares
, wherein
,
Represent that secret k splits into
Data total collection after the individual share will be gathered
In each share be presented to respectively
Individual personnel take care of, wherein
, and the secret number that each personnel obtains is
Individual, wherein
If the necessary share set of the secret k of reconstruct is provided
, then can reconstruct secret k; If provide
, then can not reconstruct secret k; And it is secret in reconstruct
Process in,
Be the orderliness requirement, running counter to the order of making an appointment then can not reconstruct secret k, wherein subscript
Be natural number, be illustrated in the certain share number that the secret k of reconstruct needs, that meet this definition is exactly order threshold schemes (k, n, t, m, p);
(2), split:
Secret k uses Lagrange interpolation polynomial to carry out function
Split computing and obtain each share
, and calculate each multinomial
, multinomial
Be specially:
, the multinomial that obtains
Be stored in trusted party, file layout is:
Subscript wherein
Respectively to represent
Required share number in the secret k order of layer reconstruct,
For the secret k of reconstruct institute must experience the combination number of plies, any share after splitting
Be distributed to each validated user keeping;
(3), recover:
The definition counting variable uses binary operation to calculate share according to the order of defined
Reconstruct behind the combinatorial operation is secret
, then judge the counting variable number of definition and the certain share number that needs at the secret k of reconstruct
Whether identical, if identical then reconstruct is secret
Be exactly secret k, if different, then continue to use binary operation to calculate the reconstruct secret
Until draw final secret k;
Step (3) also comprises:
Wherein
(3.4), judge
Whether set up, if set up then
Be exactly secret k, algorithm finishes; If
Be false, then continue to jump to step (3.2) and continue this algorithm, until calculate secret k.
(4), safety analysis:
Utilizing computing formula to derive draws:
,
For
The combination form number of individual share reconstruct order,
Be
Individual share is participated in the total number of assembled arrangement that order reconstruct needs, and is as shown in table 1:
Draw
Value with
Growth and the factorial rank increases, even then the assailant has grasped all fractionation shares, but attempt one by one all
Individual number of combinations is impossible, and therefore secret k has the fail safe of guaranteeing.
The below the order threshold schemes (k, 4, t, 4, p) describe in conjunction with the embodiments the secret distribution the present invention is based on order in the situation and share and recover recombination method:
Embodiment 1
As shown in Figure 3, share
Form in order the ground floor share, the order that all share of this layer are preserved according to trusted party is reconstructed first process, produces
, namely
Then
According to the reconstruct order of making an appointment with lower all shares of one deck be successively
Group is reconstructed again in order, produces final
, namely
,
Be exactly the secret k that was originally split.
Embodiment 2
As shown in Figure 4, share
Group forms the ground floor share in order, and the order that all share of this layer are preserved according to trusted party is reconstructed first process, produces
, namely
Then
According to the reconstruct order of making an appointment with lower all shares of one deck be successively
Group is reconstructed again in order, produces
, namely
,
According to the reconstruct order of making an appointment again with lower all shares of one deck be
Group is reconstructed again in order, produces final
, namely
,
Be exactly the secret k that was originally split.
Embodiment 3
Claims (2)
1. share and the recovery recombination method based on the secret distribution of order, it is characterized in that: it comprises following operating procedure:
(1), definition:
Define secret k, described secret k is divided into some shares
, wherein
,
Represent that described secret k splits into
Data total collection after the individual share is with described set
In each share be presented to respectively
Individual personnel take care of, wherein
, and the secret number that each personnel obtains is
Individual, wherein
If the necessary share set of the described secret k of reconstruct is provided
, then can the described secret k of reconstruct; If provide
, then can not the described secret k of reconstruct; And in the described secret of reconstruct
Process in,
Be the orderliness requirement, running counter to the order of making an appointment then can not the described secret k of reconstruct, wherein subscript
Be natural number, be illustrated in the certain share number that the described secret k of reconstruct needs, that meet this definition is exactly order threshold schemes (k, n, t, m, p);
(2), split:
Described secret k uses Lagrange interpolation polynomial to carry out function
Split computing and obtain each share
, and calculate each multinomial
, the described multinomial that obtains
Be stored in trusted party, file layout is:
Subscript wherein
Respectively to represent
Required share number in the described secret k order of layer reconstruct,
For the described secret k of reconstruct must experience the combination number of plies, any described share after splitting
Be distributed to each validated user keeping;
(3), recover:
The definition counting variable uses binary operation to calculate described share according to the order of defined
Reconstruct behind the combinatorial operation is secret
, then judge the described counting variable number of definition and the certain share number that needs at the described secret k of reconstruct
Whether identical, if identical then described reconstruct is secret
Be exactly described secret k, if different, it is secret then to continue to use binary operation to calculate described reconstruct
Until draw final described secret k;
(4), safety analysis:
Utilizing computing formula to derive draws:
2. described secret distribution based on order is shared and is recovered recombination method according to claim 1, and it is characterized in that: described step (3) also comprises:
Wherein
,
Computing is binary operator,
For each is listed as the set of the share after described secret k splits;
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210335986.9A CN102857339B (en) | 2012-09-12 | 2012-09-12 | Secret distribution sharing and recovery recombining method based on sequences |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210335986.9A CN102857339B (en) | 2012-09-12 | 2012-09-12 | Secret distribution sharing and recovery recombining method based on sequences |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102857339A true CN102857339A (en) | 2013-01-02 |
CN102857339B CN102857339B (en) | 2015-06-03 |
Family
ID=47403550
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210335986.9A Expired - Fee Related CN102857339B (en) | 2012-09-12 | 2012-09-12 | Secret distribution sharing and recovery recombining method based on sequences |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102857339B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105897409A (en) * | 2014-05-13 | 2016-08-24 | 无锡科技职业学院 | Secret key management method based on crypto chip |
CN106161034A (en) * | 2015-05-08 | 2016-11-23 | 恩智浦有限公司 | Use the RSA deciphering of multiplication privacy share |
CN107908932A (en) * | 2017-12-10 | 2018-04-13 | 宛海加 | A kind of digital cash based on L algorithms is false proof and verification method, system and equipment |
CN107979461A (en) * | 2017-10-27 | 2018-05-01 | 财付通支付科技有限公司 | Secret key method for retrieving, device, terminal, key escrow server and computer-readable recording medium |
CN109191095A (en) * | 2018-10-23 | 2019-01-11 | 湖北工业大学 | It is a kind of can quick localization of internal attacker electronic cash distribution method and system |
CN110688670A (en) * | 2019-09-04 | 2020-01-14 | 阿里巴巴集团控股有限公司 | Data processing method and device and electronic equipment |
CN111049644A (en) * | 2019-10-22 | 2020-04-21 | 贵州财经大学 | Rational and fair secret information sharing method based on confusion incentive mechanism |
CN111182171A (en) * | 2019-12-16 | 2020-05-19 | 成都信息工程大学 | Image secret sharing information processing method and system for staged decryption |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6182214B1 (en) * | 1999-01-08 | 2001-01-30 | Bay Networks, Inc. | Exchanging a secret over an unreliable network |
CN101425902A (en) * | 2008-11-12 | 2009-05-06 | 电子科技大学 | Threshold digital signature method and system having forward security |
-
2012
- 2012-09-12 CN CN201210335986.9A patent/CN102857339B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6182214B1 (en) * | 1999-01-08 | 2001-01-30 | Bay Networks, Inc. | Exchanging a secret over an unreliable network |
CN101425902A (en) * | 2008-11-12 | 2009-05-06 | 电子科技大学 | Threshold digital signature method and system having forward security |
Non-Patent Citations (3)
Title |
---|
于丹 等: "一个新的(t, n)门限多级秘密共享方案", 《计算机工程与应用》, vol. 43, no. 26, 11 September 2007 (2007-09-11), pages 142 - 143 * |
戴元军 等: "一种改进的基于拉格朗日插值的(t,n)门限秘密共享", 《北京邮电大学学报》, vol. 27, no. 2, 30 April 2004 (2004-04-30) * |
许春香 等: "门限多重秘密共享方案", 《电子学报》, vol. 32, no. 10, 31 October 2004 (2004-10-31) * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105897409A (en) * | 2014-05-13 | 2016-08-24 | 无锡科技职业学院 | Secret key management method based on crypto chip |
CN105897409B (en) * | 2014-05-13 | 2019-05-10 | 无锡科技职业学院 | A method of the management of the key based on crypto chip |
CN106161034A (en) * | 2015-05-08 | 2016-11-23 | 恩智浦有限公司 | Use the RSA deciphering of multiplication privacy share |
CN107979461A (en) * | 2017-10-27 | 2018-05-01 | 财付通支付科技有限公司 | Secret key method for retrieving, device, terminal, key escrow server and computer-readable recording medium |
CN107908932A (en) * | 2017-12-10 | 2018-04-13 | 宛海加 | A kind of digital cash based on L algorithms is false proof and verification method, system and equipment |
CN107908932B (en) * | 2017-12-10 | 2020-10-13 | 吕文华 | Digital currency anti-counterfeiting and verification method, system and equipment based on L algorithm |
CN109191095A (en) * | 2018-10-23 | 2019-01-11 | 湖北工业大学 | It is a kind of can quick localization of internal attacker electronic cash distribution method and system |
CN110688670A (en) * | 2019-09-04 | 2020-01-14 | 阿里巴巴集团控股有限公司 | Data processing method and device and electronic equipment |
CN111049644A (en) * | 2019-10-22 | 2020-04-21 | 贵州财经大学 | Rational and fair secret information sharing method based on confusion incentive mechanism |
CN111182171A (en) * | 2019-12-16 | 2020-05-19 | 成都信息工程大学 | Image secret sharing information processing method and system for staged decryption |
CN111182171B (en) * | 2019-12-16 | 2022-03-15 | 成都信息工程大学 | Image secret sharing information processing method and system for staged decryption |
Also Published As
Publication number | Publication date |
---|---|
CN102857339B (en) | 2015-06-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102857339B (en) | Secret distribution sharing and recovery recombining method based on sequences | |
Liang et al. | Secure data storage and recovery in industrial blockchain network environments | |
CN103905462B (en) | Encryption processing device and method capable of defending differential power analysis attack | |
Eslami et al. | An improvement over an image encryption method based on total shuffling | |
CN106027245B (en) | Key sharing method and device | |
Chakraborty et al. | Immunization strategies based on the overlapping nodes in networks with community structure | |
CN107124276A (en) | A kind of safe data outsourcing machine learning data analysis method | |
AU2012225621A8 (en) | Secure file sharing method and system | |
CN102946310A (en) | Fingerprint fuzzy vault method based on (k, w) threshold secret sharing scheme | |
CN103634102A (en) | Protection method for side channel attack and fault attack | |
CN102238003A (en) | Root key generating method | |
Iftikhar et al. | A reversible watermarking technique for social network data sets for enabling data trust in cyber, physical, and social computing | |
CN110413652A (en) | A kind of big data privacy search method based on edge calculations | |
Chen et al. | Fedequal: Defending model poisoning attacks in heterogeneous federated learning | |
Lu et al. | Visual cryptography on graphs | |
Wang et al. | RFLPV: A robust federated learning scheme with privacy preservation and verifiable aggregation in IoMT | |
Tamaki et al. | Security of quantum key distribution with iterative sifting | |
Noël et al. | An exploratory comparison of security patterns and tactics to harden systems | |
CN107294713A (en) | A kind of encryption and authentication method | |
Choi et al. | Entanglement sharing protocol via quantum error-correcting codes | |
CN105743639B (en) | One kind being based on the failure share restoration methods of (k, n) threshold secret sharing | |
Huang et al. | Research and application of video encryption technology based on chaotic synchronization theory | |
CN107210005A (en) | Matrix/key generating device, matrix/key generation system, matrix coupling apparatus, matrix/key generation method, program | |
CN104301103A (en) | Multi-password recovery method based on ring Zn conic curve public key cryptosystem | |
Patil et al. | Securing association rule mining with FP growth algorithm in horizontally partitioned database |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150603 Termination date: 20170912 |
|
CF01 | Termination of patent right due to non-payment of annual fee |