检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]武汉大学计算机学院,武汉430072 [2]武汉大学软件工程国家重点实验室,武汉430072
出 处:《计算机学报》2005年第6期1027-1031,共5页Chinese Journal of Computers
摘 要:无Dealer的(t,n)门限RSA算法能够使容侵系统在部分系统遭受攻击的情况下,继续保持系统私钥的安全性和可用性.在传统的无Dealer的环境中,为了使系统在遭受攻击时,以d=∑di方式共享私钥的n个参与方中的任意t个参与方有能力重构原始私钥d,要求每个参与方必须持有Ctn个子密钥.这种共享方式是诸多门限RSA的密钥共享方式中最简单、也是最有效的一种.然后Ctn随着容侵系统的规模增长太快.所以减少每个参与者所应拥有的子密钥对于提高容侵系统的容侵能力尤为重要.该文提出了一种弹性搜索算法并搜索得到优化的子密钥分配方案.该优化方案能够在不降低系统安全性的前提下,以更少的子密钥实现了相同的门限结构,从而降低了门限密码系统的密钥管理以及签名和解密的相关操作的复杂度.The ( t,n ) threshold RSA algorithm enables the system to keep the security and availability of the private key without a trusted dealer when parts of system are already under attack. In the traditional threshold RSA sub key distribution scheme, each party that shares the private key in the form of d=∑d i must keep C t n sub keys secretly in order to enable the whole system to reconstruct the original private key by any t out of n parties. It is the simplest one of all the forms of sharing RSA key and it has the best efficiency out of them. However C t n increases with the scale of intrusion tolerance (IT) system very quickly. So it is very important to decrease the number of sub keys which belong to each party to enhance the IT ability of the ITS. This paper presents a scalable searching algorithm, which can find out the optimized sub key distribution scheme that can decrease the number of sub keys that should be held by each party without weakening the system’s security. And an optimized scheme is found and listed in this paper. It can greatly reduce the complexity of key management and related operations in signing and decryption.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.222