Unconditionally Secure Rational Secret Sharing in Standard Communication Networks

被引:0
|
作者
Zhang, Zhifang [1 ]
Liu, Mulan [1 ]
机构
[1] Chinese Acad Sci, Key Lab Math Mechanizat, Acad Math & Syst Sci, Beijing, Peoples R China
关键词
rational secret sharing; epsilon-Nash equilibrium; unconditional security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rational secret sharing protocols in both the two-party and multi-party settings are proposed. These protocols are built in standard communication networks and with unconditional security. Namely, the protocols run over standard point-to-point networks without requiring physical assumptions or simultaneous channels, and even a computationally unbounded player cannot gain more than epsilon by deviating from the protocol. More precisely, for the 2-out-of-2 protocol the epsilon is a negligible function in the size of the secret, which is caused by the information-theoretic MACs used for authentication. The t-out-of-n protocol is (t - 1)-resilient and the epsilon is exponentially small in the number of participants. Although secret recovery cannot be guaranteed in this setting, a participant can at least reduce the Shannon entropy of the secret to less than 1 after the protocol. When the secret-domain is large, every rational player has great incentive to participate in the protocol.
引用
收藏
页码:355 / 369
页数:15
相关论文
共 50 条
  • [31] Rational Secret Sharing Information-theoretically Secure Against Adaptive Adversaries
    Yu, Yang
    Zhou, Zhanfei
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 249 - 256
  • [32] On the Communication Required for Unconditionally Secure Multiplication
    Damgard, Ivan
    Nielsen, Jesper Buus
    Polychroniadou, Antigoni
    Raskin, Michael
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 459 - 488
  • [33] Multiparty quantum secret sharing of secure direct communication using teleportation
    Wang Jian
    Zhang Quan
    Tang Chao-Jing
    COMMUNICATIONS IN THEORETICAL PHYSICS, 2007, 47 (03) : 454 - 458
  • [34] Achieving secure communication over MANET using secret sharing schemes
    Kobayashi, Kei
    Totani, Yosuke
    Utsu, Keisuke
    Ishii, Hiroshi
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (03): : 1215 - 1225
  • [35] Achieving secure communication over MANET using secret sharing schemes
    Kei Kobayashi
    Yosuke Totani
    Keisuke Utsu
    Hiroshi Ishii
    The Journal of Supercomputing, 2016, 72 : 1215 - 1225
  • [36] Multiparty Quantum Secret Sharing of Secure Direct Communication Using Teleportation
    WANG Jian~+ ZHANG Quan TANG Chao-Jing School of Electronic Science and Engineering
    Communications in Theoretical Physics, 2007, 47 (03) : 454 - 458
  • [37] Secure Network Coding for Distributed Secret Sharing with Low Communication Cost
    Shah, Nihar B.
    Rashmi, K. V.
    Ramchandran, Kannan
    2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 2404 - 2408
  • [38] NTRU and Secret Sharing Based Secure Group Communication for IoT Applications
    Saha, Sanchita
    Hota, Ashlesha
    Choudhury, Bikramjit
    Nag, Amitava
    Nandi, Sukumar
    IEEE ACCESS, 2023, 11 : 117341 - 117350
  • [39] Secret-sharing Based Secure Communication Protocols for Passive RFIDs
    Kapoor, Harsh
    Huang, Dijiang
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 5717 - 5722
  • [40] Enhanced semantic visual secret sharing scheme for the secure image communication
    Blesswin, John A.
    Raj, Christhu
    Sukumaran, Rajeev
    Mary, Selva G.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) : 17057 - 17079