[1]魏家好 侯整风.基于(r,n)门限的密钥恢复方案[J].计算机技术与发展,2006,(10):134-136.
 WEI Jia-hao,HOU Zheng-feng.Key Recovering Based on (r, n ) Threshold Scheme[J].,2006,(10):134-136.
点击复制

基于(r,n)门限的密钥恢复方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2006年10期
页码:
134-136
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Key Recovering Based on (r, n ) Threshold Scheme
文章编号:
1673-629X(2006)10-0134-03
作者:
魏家好 侯整风
合肥工业大学计算机与信息学院
Author(s):
WEI Jia-hao HOU Zheng-feng
School of Computer and Information, Hefei University of Technology
关键词:
门限方案秘密共享密钥恢复
Keywords:
threshold scheme secret sharing key recovering
分类号:
TP309.7
文献标志码:
A
摘要:
随着计算机技术的普及发展,信息安全越来越受到重视,许多系统借助加密技术来保证信息在存储传输过程中的安全性,而密码系统中所使用的密钥或口令的安全性则成为系统的薄弱环节,密钥的丢失会给用户造成不必要的损失。文中介绍了一种应用(r,n)门限进行密钥恢复的新方案,该方案综合应用门限技术和因特网中广泛使用的回答问题认证模式来恢复丢失的密钥或口令。与传统密钥的恢复方案相比,具有较好的易用性和安全性
Abstract:
With the development of computer technology, information security is becoming more important than ever before. Lots of system deploys cryptogmphic technologies to insure the information's security during its storing and transmitting processes. One of the most eommon problems with cryptography system is that users sometimes forget their passwords or even lose their private keys. So proposes a new approach to recover the lost keys or passwords based on ( r, n ) threshold scheme. Compared with the traditional key recovery scheme, it is more available and feasible

相似文献/References:

[1]刘琼 潘进 刘炯.基于同步卫星通信网络的弱安全网络编码[J].计算机技术与发展,2012,(07):143.
 LIU Qiong,PAN Jin,LIU Jiong.Weakly Secure Network Coding Based on Synchronous Satellite Communication Networks[J].,2012,(10):143.
[2]韦性佳,张京花,芦殿军.基于ECC 的具有前向安全性的 VSS 方案[J].计算机技术与发展,2018,28(04):157.[doi:10.3969/ j. issn.1673-629X.2018.04.033]
 WEI Xing-jia,ZHANG Jing-hua,LU Dian-jun.A Forward Security Secret Sharing Scheme Based on ECC[J].,2018,28(10):157.[doi:10.3969/ j. issn.1673-629X.2018.04.033]

备注/Memo

备注/Memo:
魏家好(1981-),男,安徽和县人,硕士研究生,研究方向为计算机网络与信息安全;侯整风,教授,研究方向为计算机网络与信息安全、数据库
更新日期/Last Update: 1900-01-01