首页> 美国政府科技报告 >Protocol to set up shared secret schemes without the assistance of a mutually trusted party.
【24h】

Protocol to set up shared secret schemes without the assistance of a mutually trusted party.

机译:在没有相互信任方的帮助下建立共享秘密方案的协议。

获取原文

摘要

All shared secret or shared control schemes devised thus far are autocratic in the sense that they depend in their realization on the existence of a single party--which may be either an individual or a device--that is unconditionally trusted by all the participants in the scheme. The function of this trusted party is to first choose the secret (piece of information) and then to construct and distribute in secret to each of the participants the private pieces of information which are their shares in the shared secret or control scheme. The private pieces of information are constructed in such a way that any authorized concurrence (subset) of the participants will jointly have sufficient information abut the secret to reconstruct it while no unauthorized collection of them will be able to do so. For many applications, though, there is no one who is trusted by all of the participants, and in the extreme case, no one who is trusted by anyone else. In the absence of a trusted party or authority, no one can be trusted to know the secret and hence--until now--it has appeared to be impossible to construct and distribute the private pieces of information needed to realize a shared control scheme. It is worth noting that in commercial and/or internation(al) applications, this situation is more nearly the norm than the exception. This document discusses the protocol for shared secret schemes in the absence of a trusted party or authority. 7 refs., 5 figs.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号