• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于量子密钥分发网络和密码认证秘密共享的不可破解分布式存储。

Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing.

作者信息

Fujiwara M, Waseda A, Nojima R, Moriai S, Ogata W, Sasaki M

机构信息

Quantum ICT Laboratory, National Institute of Information and Communications Technology (NICT), 4-2-1 Nukui-kita, Koganei, Tokyo 184-8795, Japan.

Security Fundamentals Laboratory, National Institute of Information and Communications Technology (NICT), 4-2-1 Nukui-kita, Koganei, Tokyo 184-8795, Japan.

出版信息

Sci Rep. 2016 Jul 1;6:28988. doi: 10.1038/srep28988.

DOI:10.1038/srep28988
PMID:27363566
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC4929494/
Abstract

Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir's (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km).

摘要

分布式存储在实现网络中长时间可靠且安全的数据存储方面发挥着至关重要的作用。分布式存储系统由一台数据所有者机器、多个存储服务器以及连接它们的通道组成。在这样的系统中,秘密共享方案被广泛采用,即秘密数据被分割成多个片段并存储在每个服务器中。为了重构这些数据,数据所有者需要收集多个片段。沙米尔(k,n)阈值方案将数据分割成n个片段(份额)进行存储,并且至少需要收集k个片段才能进行重构,该方案提供了信息理论安全性,也就是说,即使攻击者能够收集到少于阈值k的份额,他们也无法获取任何有关数据的信息,即便拥有无限的计算能力。然而,在这种情况下,假设数据传输和认证必须是完全安全的,而这在实际中并非易事。在此,我们基于用户友好的单密码认证秘密共享方案和使用量子密钥分发的安全传输,提出了一种完全信息理论安全的分布式存储系统,并在东京都市区(≤90公里)进行了演示。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e3b3/4929494/9a19d9152339/srep28988-f3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e3b3/4929494/e8d08d820732/srep28988-f1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e3b3/4929494/59f6160bfb2f/srep28988-f2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e3b3/4929494/9a19d9152339/srep28988-f3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e3b3/4929494/e8d08d820732/srep28988-f1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e3b3/4929494/59f6160bfb2f/srep28988-f2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e3b3/4929494/9a19d9152339/srep28988-f3.jpg

相似文献

1
Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing.基于量子密钥分发网络和密码认证秘密共享的不可破解分布式存储。
Sci Rep. 2016 Jul 1;6:28988. doi: 10.1038/srep28988.
2
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication.基于 Shamir 秘密共享和 HMAC 认证的集中式门限密钥生成协议。
Sensors (Basel). 2022 Jan 3;22(1):331. doi: 10.3390/s22010331.
3
A Higher Performance Data Backup Scheme Based on Multi-Factor Authentication.一种基于多因素认证的高性能数据备份方案。
Entropy (Basel). 2024 Aug 5;26(8):667. doi: 10.3390/e26080667.
4
Nonlinear secret image sharing scheme.非线性秘密图像共享方案。
ScientificWorldJournal. 2014;2014:418090. doi: 10.1155/2014/418090. Epub 2014 Jul 21.
5
Fake and dishonest participant location scheme in secret image sharing.秘密图像共享中的虚假和不诚实参与者位置方案。
Math Biosci Eng. 2021 Mar 12;18(3):2473-2495. doi: 10.3934/mbe.2021126.
6
A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.一种基于 Shamir 三通道加密协议和多参数分数阶傅里叶变换的无密钥交换安全图像共享方案。
Opt Express. 2012 Jan 30;20(3):2386-98. doi: 10.1364/OE.20.002386.
7
A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.TMIS 中分层多医疗服务器环境的安全稳健的用户认证密钥协商方案。
J Med Syst. 2015 Sep;39(9):92. doi: 10.1007/s10916-015-0276-5. Epub 2015 Aug 6.
8
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.基于多项式插值的新型阈值可变秘密共享方案
PLoS One. 2016 Oct 28;11(10):e0165512. doi: 10.1371/journal.pone.0165512. eCollection 2016.
9
An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.一种用于集成电子病历信息系统的、具有密钥协商方案的改进型安全匿名生物特征用户认证方法。
PLoS One. 2017 Jan 3;12(1):e0169414. doi: 10.1371/journal.pone.0169414. eCollection 2017.
10
A Selective Group Authentication Scheme for IoT-Based Medical Information System.一种用于基于物联网的医疗信息系统的选择性群组认证方案。
J Med Syst. 2017 Apr;41(4):48. doi: 10.1007/s10916-017-0692-9. Epub 2017 Feb 15.

引用本文的文献

1
Information processing at the speed of light.以光速进行信息处理。
Front Optoelectron. 2024 Sep 29;17(1):33. doi: 10.1007/s12200-024-00133-3.
2
Secure secondary utilization system of genomic data using quantum secure cloud.利用量子安全云保护基因组数据的二次利用系统。
Sci Rep. 2022 Nov 2;12(1):18530. doi: 10.1038/s41598-022-22804-x.
3
Experimental demonstration of quantum digital signatures over 43 dB channel loss using differential phase shift quantum key distribution.利用差分相移量子密钥分发实现了 43dB 信道损耗下的量子数字签名的实验演示。

本文引用的文献

1
Maintenance-free operation of WDM quantum key distribution system through a field fiber over 30 days.通过现场光纤实现波分复用量子密钥分发系统30天以上的免维护运行。
Opt Express. 2013 Dec 16;21(25):31395-401. doi: 10.1364/OE.21.031395.
2
Decoy state quantum key distribution.诱骗态量子密钥分发
Phys Rev Lett. 2005 Jun 17;94(23):230504. doi: 10.1103/PhysRevLett.94.230504. Epub 2005 Jun 16.
Sci Rep. 2017 Jun 12;7(1):3235. doi: 10.1038/s41598-017-03401-9.