Unconditionally Secure Rational Secret Sharing in Standard Communication Networks

被引:0
|
作者
Zhang, Zhifang [1 ]
Liu, Mulan [1 ]
机构
[1] Chinese Acad Sci, Key Lab Math Mechanizat, Acad Math & Syst Sci, Beijing, Peoples R China
关键词
rational secret sharing; epsilon-Nash equilibrium; unconditional security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rational secret sharing protocols in both the two-party and multi-party settings are proposed. These protocols are built in standard communication networks and with unconditional security. Namely, the protocols run over standard point-to-point networks without requiring physical assumptions or simultaneous channels, and even a computationally unbounded player cannot gain more than epsilon by deviating from the protocol. More precisely, for the 2-out-of-2 protocol the epsilon is a negligible function in the size of the secret, which is caused by the information-theoretic MACs used for authentication. The t-out-of-n protocol is (t - 1)-resilient and the epsilon is exponentially small in the number of participants. Although secret recovery cannot be guaranteed in this setting, a participant can at least reduce the Shannon entropy of the secret to less than 1 after the protocol. When the secret-domain is large, every rational player has great incentive to participate in the protocol.
引用
收藏
页码:355 / 369
页数:15
相关论文
共 50 条
  • [1] Efficient Rational Secret Sharing in Standard Communication Networks
    Fuchsbauer, Georg
    Katz, Jonathan
    Naccache, David
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 419 - +
  • [2] Unconditionally secure social secret sharing scheme
    Nojoumian, M.
    Stinson, D. R.
    Grainger, M.
    IET INFORMATION SECURITY, 2010, 4 (04) : 202 - 211
  • [3] Providing Anonymity in Unconditionally Secure Secret Sharing Schemes
    Mida Guillermo
    Keith M. Martin
    Christine M. O'Keefe
    Designs, Codes and Cryptography, 2003, 28 : 227 - 245
  • [4] Providing anonymity in unconditionally secure secret sharing schemes
    Guillermo, M
    Martin, KM
    O'Keefe, CM
    DESIGNS CODES AND CRYPTOGRAPHY, 2003, 28 (03) : 227 - 245
  • [5] RATIONAL MULTI-SECRET SHARING SCHEME IN STANDARD POINT-TO-POINT COMMUNICATION NETWORKS
    Zhang, En
    Cai, Yongquan
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2013, 24 (06) : 879 - 897
  • [6] Rational Secret Sharing Eliminating Incredible Threat in Standard Communication Network
    Sun Fuling
    Zhou Zhanfei
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 358 - 362
  • [7] UNCONDITIONALLY SECURE FAIR (t, n)-SECRET SHARING SCHEME
    Al Mahmoud, Qassim
    Besoul, Khaldoun
    Alhalaybeh, Ayman
    ADVANCES AND APPLICATIONS IN DISCRETE MATHEMATICS, 2023, 38 (01): : 127 - 143
  • [8] Unconditionally secure proactive secret sharing scheme with combinatorial structures
    Stinson, DR
    Wei, R
    SELECTED AREAS IN CRYPTOGRAPHY, PROCEEDINGS, 2000, 1758 : 200 - 214
  • [9] Dynamic access policies for unconditionally secure secret sharing schemes
    Martin, KM
    2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005, : 61 - 66
  • [10] Unconditionally-Secure Robust Secret Sharing with Compact Shares
    Cevallos, Alfonso
    Fehr, Serge
    Ostrovsky, Rafail
    Rabani, Yuval
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 195 - 208