门限密码技术及其标准化进展OA北大核心CSTPCD
Threshold Cryptography Technology and Standardization Process
信息技术的发展,加剧了信息终端的多样性和复杂性,使得单个终端的安全保障变得更加脆弱,能抵御"单点故障"的门限密码需求就变得更加重要.本文从门限密码的基础元素和框架入手,首先介绍门限密码的方案组成和安全定义、门限密码设计中常用的多方联合秘密生成技术和门限联合计算方法以及门限密码方案的评价指标.然后总结了门限密码学领域不同算法的门限方案研究进展,旨在介绍门限密码学在各类算法中安全性、效率等方面的研究重点和进展及在实践中的应用,并让读者了解门限密码学研究的最新动态.众多门限密码方案的实现以秘密分享为基础,目前多采用简单加法或者多项式加法类型的秘密分享,这种方式在门限密码实现时面临的重要问题是秘密的乘积和求逆的安全联合计算,现有方案主要采用同态加密等较重的技术来解决这个问题,使得方案的效率较低.最后介绍了美国国家标准技术研究院(NIST)和互联网工程任务组(IETF)等机构的门限密码标准化工作.尽管门限密码各类算法层出不穷,标准化工作推进较快,但产业跟进却相对迟缓.相较之下,较为简单的(2,2)门限签名方案,即协同签名方案,在产业界得到了较为成熟的应用,为软件密码产品提供了可靠的安全保障.
The development of information technology has intensified the diversity and complexity of information endpoints,making the security of individual endpoints more fragile.Therefore,the demand for threshold cryptography capable of withstanding"single point of failure"has grown sig-nificantly.This paper starts with illustrating the fundamental elements and framework of threshold cryptography,introducing the structural components and security definitions of threshold cryptogra-phy schemes,the techniques for collaborative secret generation by multi-party which are commonly used in threshold cryptography,and the methods for collaborative threshold computation,as well as the evaluation criteria for threshold cryptography schemes.This paper summarizes the research progress of different algorithmic threshold schemes in threshold cryptography,aiming to highlight the research focus and progress in security and efficiency across various algorithms,their practical appli-cations,and to acquaint the readers with the latest trends in threshold cryptography research.The implementation of many threshold cryptography schemes is based on the techniques of secret sharing,mostly employing straightforward addition or polynomial addition techniques.This approach encoun-ters significant challenges in the collaborative secure computation of secret products and inversions in the implementation of threshold cryptography.Many schemes employ intensive technologies such as homomorphic encryption to solve this problem,leading to lower efficiency.As security demands increase,the standardization of threshold cryptographic technology has garnered attention from many developed countries.This paper introduces the standardization work of threshold cryptography by entities such as the National Institute of Standards and Technology(NIST)and the Internet Engi-neering Task Force(IETF).Despite the proliferation of various threshold cryptography algorithms and rapid development of standardization efforts in threshold cryptography,industrial follow-ups have been relatively slow.By contrast,the simple(2,2)threshold signature scheme,also known as cooper-ative signature scheme,has achieved mature applications in the industry sector,providing dependable security for software-based cryptography products.
荆继武;张世聪;王平建
中国科学院大学密码学院,北京 100190中国科学院大学密码学院,北京 100190||中国科学院信息工程研究所,北京 100085
计算机与自动化
门限密码门限签名门限加密秘密分享
threshold cryptoststemthreshold signaturethreshold encryptionsecret sharing
《密码学报》 2024 (001)
227-254 / 28
国家重点研发计划(2022YFB3103303)National Key Research and Development Program of China(2022YFB3103303)
评论