On identification secret sharing schemes

被引:5
|
作者
Cai, N
Lam, KY
机构
[1] Univ Bielefeld, Fak Math, D-33501 Bielefeld, Germany
[2] Natl Univ Singapore, Sch Comp, Singapore 119260, Singapore
关键词
identification; secret sharing; public message;
D O I
10.1016/S0890-5401(03)00056-7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Let P be a set of participants sharing a secret from a set of secrets. A secret sharing scheme is a protocol such that any qualified subset of P can determine the secret by pooling their shares, the messages which they receive, without error, whereas non-qualified subsets of P cannot obtain any knowledge about the secret when they pool what they receive. In (optimal) schemes, the sizes of shared secrets depend on the sizes of shares given to the participants. Namely the former grow up exponentially as the latter increase exponentially. In this paper, instead of determining the secret, we require the qualified subsets of participants to identify the secret. This change would certainly make no difference from determining secret if no error for identification were allowed. So here we relax the requirement to identification such that an error may occur with a vanishing probability as the sizes of the secrets grow up. Under relaxed condition this changing allows us to share a set of secrets with double exponential size as the sizes of shares received by the participants exponentially grow. Thus much longer secret can be shared. On the other hand, by the continuity of Shannon entropy we have that the relaxation makes no difference for (ordinary) secret sharing schemes. We obtain the characterizations of relations of sizes of secrets and sizes of the shares for identification secret sharing schemes without and with public message. Our idea originates from Ahlswede-Dueck's awarded work in 1989, where the identification codes via channels were introduced. (C) 2003 Published by Elsevier Science (USA).
引用
收藏
页码:298 / 310
页数:13
相关论文
共 50 条
  • [1] CHEATING DETECTION AND CHEATER IDENTIFICATION IN SECRET SHARING SCHEMES
    WU, TC
    WU, TS
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (05): : 367 - 369
  • [2] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    [J]. INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [3] On secret reconstruction in secret sharing schemes
    Wang, Huaxiong
    Wong, Duncan S.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 473 - 480
  • [4] On Proactive Secret Sharing Schemes
    Nikov, V
    Nikova, S
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 308 - 325
  • [5] PERFECT SECRET SHARING SCHEMES
    Parvatov, K. G.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 50 - 57
  • [6] Secret sharing schemes on graphs
    Csirmaz, Laszlo
    [J]. STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA, 2007, 44 (03) : 297 - 306
  • [7] Partial Secret Sharing Schemes
    Jafari, Amir
    Khazaei, Shahram
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (08) : 5364 - 5385
  • [8] Anonymous secret sharing schemes
    Blundo, C
    Stinson, DR
    [J]. DISCRETE APPLIED MATHEMATICS, 1997, 77 (01) : 13 - 28
  • [9] Efficient Secret Sharing Schemes
    Lv, Chunli
    Jia, Xiaoqi
    Lin, Jingqiang
    Jing, Jiwu
    Tian, Lijun
    Sun, Mingli
    [J]. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 114 - +
  • [10] Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    [J]. 2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 264 - 268