作者: ChunMing Tang , ShuHong Gao
DOI: 10.1007/S11432-011-4480-8
关键词:
摘要: In a traditional ( t, n )-threshold secret sharing scheme, t or more honest participants can reconstruct the K. reconstruction process, individual shares and key K are revealed, hence is shared once only. this paper, we firstly give definition of leakproof scheme which composed distribution protocol proof protocol, then propose two protocols, computationally secure an information-theoretically protocol. our jointly prove that they hold by using multi-prover zero-knowledge argument knowledge. As result, will be for as many times desired. Furthermore, each participant detect dealer in from cheating, any verifier prevent non-qualified set cheating. example practical impact work use techniques to construct group identification schemes with zero-knowledge.