Unconditionally Secure Rational Secret Sharing in Standard Communication Networks

被引:0
|
作者
Zhang, Zhifang [1 ]
Liu, Mulan [1 ]
机构
[1] Chinese Acad Sci, Key Lab Math Mechanizat, Acad Math & Syst Sci, Beijing, Peoples R China
关键词
rational secret sharing; epsilon-Nash equilibrium; unconditional security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rational secret sharing protocols in both the two-party and multi-party settings are proposed. These protocols are built in standard communication networks and with unconditional security. Namely, the protocols run over standard point-to-point networks without requiring physical assumptions or simultaneous channels, and even a computationally unbounded player cannot gain more than epsilon by deviating from the protocol. More precisely, for the 2-out-of-2 protocol the epsilon is a negligible function in the size of the secret, which is caused by the information-theoretic MACs used for authentication. The t-out-of-n protocol is (t - 1)-resilient and the epsilon is exponentially small in the number of participants. Although secret recovery cannot be guaranteed in this setting, a participant can at least reduce the Shannon entropy of the secret to less than 1 after the protocol. When the secret-domain is large, every rational player has great incentive to participate in the protocol.
引用
收藏
页码:355 / 369
页数:15
相关论文
共 50 条
  • [21] Quantum secret sharing based on Smolin bound entangled states isnot unconditionally secure
    Yu, Ya-fei
    Zhang, Zhi-ming
    QUANTUM OPTICS, OPTICAL DATA STORAGE, AND ADVANCED MICROLITHOGRAPHY, 2008, 6827
  • [22] Unconditionally secure non-malleable secret sharing and circular external difference families
    Veitch, Shannon
    Stinson, Douglas R.
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (04) : 941 - 956
  • [23] Verifiable Rational Secret Sharing Scheme in Mobile Networks
    Zhang, En
    Yuan, Peiyan
    Du, Jiao
    MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [24] An Efficient Quantum Secret Sharing using Secure Direct Communication
    Khorrampanah, Mahsa
    Houshmand, Monireh
    2013 21ST IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2013,
  • [25] Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure
    Jhanwar, Mahabir P.
    Safavi-Naini, Reihaneh
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (04) : 279 - 296
  • [26] Secret sharing with secure secret reconstruction
    Harn, Lein
    Xia, Zhe
    Hsu, Chingfang
    Liu, Yining
    INFORMATION SCIENCES, 2020, 519 : 1 - 8
  • [27] A Novel and Secure Secret Sharing Algorithm Applied to Insecure Networks
    Meng, Keju
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (02) : 1635 - 1650
  • [28] Enabling Secure Secret Sharing in Distributed Online Social Networks
    Vu, Le-Hung
    Aberer, Karl
    Buchegger, Sonja
    Datta, Anwitaman
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 419 - +
  • [29] A Novel and Secure Secret Sharing Algorithm Applied to Insecure Networks
    Keju Meng
    Wireless Personal Communications, 2020, 115 : 1635 - 1650
  • [30] Cryptographic Rational Secret Sharing Schemes over General Networks
    Labao, Alfonso
    Adorna, Henry
    CRYPTOGRAPHY, 2022, 6 (04)