计算机网络和信息集成教育部重点实验室(东南大学)

 
   



2018年学术报告


--- 2018年学术报告
---
<strong>Secret Sharing and Its Applications</strong>

时间:2018年6月6日 下午14:00 地点:九龙湖计算机楼513

报告简介:

   Secret sharing is one of the most popular cryptographic tools in network applications used to protect data. For example, secret sharing has been used in cloud to strengthen data security. Shamir’s threshold secret sharing scheme which was proposed originally in 1979 is the most popular scheme in the literature. In this talk, I will briefly introduce Shamir’s scheme and point out some interesting properties. Then, I will introduce some related research problems to the secret sharing, including secure and fair secret reconstruction, verifiable secret sharing, multi-secret sharing, cheater detection and identification in the secret reconstruction. Applications using the secret sharing will also be discussed, such as group key establishment in group communications and group authentication. Finally, I will briefly introduce a new research direction based on my publication this year.

报告人简介:

  Lein Harn (� 亮) received the B.S. degree in electrical engineering from the National Taiwan University in 1977, the M.S. degree in electrical engineering from the State University of New York-Stony Brook in 1980, and the Ph.D. degree in electrical engineering from the University of Minnesota in 1984. In 1984, he joined the Department of Electrical and Computer Engineering, University of Missouri- Columbia as an Assistant Professor, and in 1995, he has been promoted as a Full Professor, University of Missouri, Kansas City (UMKC). While at UMKC, he went on development leave to work in Racal Data Group, Florida for a year. His research interests include cryptography, network security, and wireless communication security. He has published over hundred research journal papers on digital signature design and applications, and wireless and network security. He has written two books on security. He is currently investigating new ways of using secret sharing in various applications.
   

东南大学计算机网络和信息集成教育部重点实验室 版权所有