A Scheme of Rational Secret Sharing against Cheating

被引:0
|
作者
Cai, Yongquan [1 ]
Shi, Huili [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing, Peoples R China
关键词
secret sharing; game theory; repeated games; Nash equilibrium; trigger strategy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To address the issues and deficiencies of the traditional secret sharing scheme, we propose a rational secret sharing mechanism which applies game theory into secret sharing protocol. The paper mainly focuses on the secret sharing participants, who are rational, selfish and want to obtain the maximum benefit, how to detect cheat and take some punishable strategies to avoid being deceived under the condition of not revealing their secret share. By detailed analysis, we find that the scheme combining with the advantages of game theory and traditional secret sharing is feasible, secure and effective.
引用
收藏
页码:166 / 169
页数:4
相关论文
共 50 条
  • [21] Cheating identifiable polynomial based secret sharing scheme for audio and image
    Prashanti, Guttikonda
    Bhat, Mundukur Nirupama
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (1) : 403 - 423
  • [22] Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
    Liu, Yanxiao
    Yang, Chingnung
    Wang, Yichuan
    Zhu, Lei
    Ji, Wenjiang
    [J]. INFORMATION SCIENCES, 2018, 453 : 21 - 29
  • [23] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Chenhong Yan
    Zhihui Li
    Lu Liu
    Dianjun Lu
    [J]. Quantum Information Processing, 2022, 21
  • [24] (k, n) secret image sharing scheme capable of cheating detection
    Liu, Yan-Xiao
    Sun, Qin-Dong
    Yang, Ching-Nung
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [25] Cheating identifiable polynomial based secret sharing scheme for audio and image
    Guttikonda Prashanti
    Mundukur Nirupama Bhat
    [J]. Multimedia Tools and Applications, 2024, 83 : 403 - 423
  • [26] Cheating detection and cheater identification in (t, n) secret sharing scheme
    Wang, Zhixiao
    Liu, Yanxiao
    Yan, Wenyao
    Wei, Wei
    Li, Junhuai
    Zhang, Deyun
    Alfandi, Omar
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2014, 29 (01): : 87 - 93
  • [27] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Yan, Chenhong
    Li, Zhihui
    Liu, Lu
    Lu, Dianjun
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (01)
  • [28] Cheating Resistance for Secret Sharing
    Chan, Chao-Wen
    Chang, Chin-Chen
    Wang, Zhi-Hui
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 840 - +
  • [29] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [30] Rational secret sharing scheme based on Markov decision
    Tian, You-Liang
    Wang, Xue-Mei
    Liu, Lin-Fang
    [J]. Tongxin Xuebao/Journal on Communications, 2015, 36 (09): : 222 - 229