• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

Computer Engineering & Science ›› 2022, Vol. 44 ›› Issue (08): 1382-1391.

• Computer Network and Znformation Security • Previous Articles     Next Articles

A threshold multi-secret sharing scheme with identity lock

CUI Chen-yu1,ZHANG Li-na1,2   

  1. (1.College of Computer Science and Technology,Xi’an University of Science and Technology,Xi’an 710600;
    2.College of Computer Science,Shaanxi Normal University,Xi’an 710119,China)
  • Received:2021-10-09 Revised:2021-11-22 Accepted:2022-08-25 Online:2022-08-25 Published:2022-08-25

Abstract: In order to avoid the disadvantage that different secrets has the same access control structure in the existing secret sharing schemes, a threshold multi-secret sharing scheme based on identity lock is proposed, which determines the authorized subset of the secret. Only the user  in the authorized subset can recover the secret. There are different identity locks for different secrets.H3:  preset that the system has a secure channel to transmit secret shares,Under the premise of keeping the sub-secrets reusable and detectable for deception, it does not increase the information interaction of any participants, and effectively solves the problem that the access control structure of different secrets is difficult to change. At the same time, based on the session key negotiation algorithm, the scheme does not need to use a secure channel to transmit the secret share in advance, so it has better security and practicability. The scheme is suitable for the scenarios of multi-secret threshold sharing based on identity access control, such as video conference and file distribution.

Key words: access control, identity lock, deception detection, key negotiation, multi-secret sharing ,