2015
11
1, 2
,
1, 3
,
2
,
2
,
2
,
4
(
;
;
;
)
: ,
。 、 , 、 ,
M
M
M
’ 。
, 。
: ; ;
M
; ; ;
10.11959/j.issn.1000-0801.2015251
Cheng Yexia
1, 2
,
Du Yuejin
1, 3
,
Yang Kai
2
, He Shen
2
,
Peng Jin
2
,
Jiang Wen
4
(1. Institute of Information Engineering, China Academy of Sciences , Beijing 100093, China;
2. Departme nt of Security Technology, China Mobile Research Insti tut e, Beijing 100053, China;
3. Securi t y Department, Alibaba Group, Beijing 100102, China;
4. Nati o na l Computer Network Emergency Respons e Technical Team/Coordination Center of China, Beijing 100029 , China)
A novel secret sharing method was proposed based on binary sequence, which was qui t e different from
the traditional secret s haring method. This secret sharing method was based on binary secret sequence using bit
operations. The secret here i ncl uded but not limited to key, message, etc, meanwhile the secret sequence included
but not limited to key sequence, message seque nc e and so on. And two new concepts which were called non-M
sequence and non-M sequence rule method were defined. By using the non-M sequence rule method, the elements
of sub-secret sequence M
’
of secret sharing were compute d. The method for generating sub-secrets and the method
for recovering secret was proposed based on binary sequence. The method was practical and effective.
secret sharing, binary sequence, non-M sequence, threshold scheme, secret recovery, information
security
:
2015-06-17
; :
2015-09-23
: (
No. 6 117 117 3
),
(
“
863
”
)
(
No. 2011AA01A103
),
( )
:
The National Natural Science Foundation of China
(
No.61171173
),
The National High Technology Research and Development
Program of China (863 Program)
(
No. 2011AA01A103
),
The National Development and Reform Commission Innovation Capacity Building Project
of Information Area Fund
(
NELCERT
)
: , ,
.
.
,
2015251
Cheng Y X, Du Y J, Yang K, et al. A novel method for secret sharing based on binary sequence. Telecommunications Science, 2015251
2015251-1