首页> 外文期刊>IEEE Transactions on Computers >Design of Reliable and Secure Devices Realizing Shamir's Secret Sharing
【24h】

Design of Reliable and Secure Devices Realizing Shamir's Secret Sharing

机译:实现Shamir秘密共享的可靠安全的设备设计

获取原文
获取原文并翻译 | 示例

摘要

Shamir's secret sharing scheme is an effective way to distribute secret to a group of shareholders. The security of the unprotected sharing scheme, however, can be easily broken by cheaters or attackers who maliciously feed incorrect shares during the secret recovery stage or inject faults into hardware computing the secret. In this paper, we propose cheater detection and identification schemes based on robust and algebraic manipulation detection (AMD) codes and m-disjunct matrices (superimposed codes). We present the constructions of codes for cheater detection and identification and describe how the cheater identification problem can be related to the classic group testing algorithms based on m-disjunct matrices. Simulation and synthesis results show that the proposed architecture can improve the security level significantly even under strong cheating attack models with reasonable area and timing overheads.
机译:Shamir的秘密共享计划是将秘密分发给一组股东的有效方法。但是,作弊者或攻击者很容易破坏未受保护的共享方案的安全性,他们会在秘密恢复阶段恶意提供不正确的份额,或者将错误注入到计算秘密的硬件中。在本文中,我们提出了基于鲁棒和代数操纵检测(AMD)码和m分相矩阵(叠加码)的作弊者检测和识别方案。我们提出了作弊者检测和识别代码的结构,并描述了作弊者识别问题如何与基于m分相矩阵的经典组测试算法相关。仿真和综合结果表明,所提出的体系结构即使在具有合理面积和时序开销的强作弊攻击模型下也可以显着提高安全级别。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号