Rational secret sharing, revisited

被引:0
|
作者
Gordon, S. Dov [1 ]
Katz, Jonathan [1 ]
机构
[1] Univ Maryland, Dept Comp Sci, College Pk, MD 20742 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the problem of secret sharing among n rational players. This problem was introduced by Halpern and Teague (STOC 2004), who claim that a solution is impossible for n = 2 but show a solution for the case n >= 3. Contrary to their claim, we show a protocol for rational secret sharing among n = 2 players; our protocol extends to the case n >= 3, where it is simpler than the Halpern-Teague solution and also offers a number of other advantages. We also show how to avoid the continual involvement of the dealer, in either our own protocol or that of Halpern and Teague. Our techniques extend to the case of rational players trying to securely compute an arbitrary function, under certain assumptions on the utilities of the players.
引用
下载
收藏
页码:229 / 241
页数:13
相关论文
共 50 条
  • [21] A Scheme of Rational Secret Sharing Against Cheating
    Cai Yong-quan
    Shi Hui-li
    INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 60 - 64
  • [22] Achieve Fairness in Rational Secret Sharing Protocol
    Jie, Wang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (11): : 13 - 22
  • [23] Bayesian mechanism for rational secret sharing scheme
    TIAN YouLiang
    PENG ChangGen
    LIN DongDai
    MA JianFeng
    JIANG Qi
    JI WenJiang
    Science China(Information Sciences), 2015, 58 (05) : 121 - 133
  • [24] Bayesian mechanism for rational secret sharing scheme
    Tian YouLiang
    Peng ChangGen
    Lin DongDai
    Ma JianFeng
    Jiang Qi
    Ji WenJiang
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (05) : 1 - 13
  • [25] Purely Rational Secret Sharing (Extended Abstract)
    Micali, Silvio
    Shelat, Abhi
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 54 - +
  • [26] A Scheme of Rational Secret Sharing against Cheating
    Cai, Yongquan
    Shi, Huili
    PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 166 - 169
  • [27] Two Optimum Secret Sharing Schemes Revisited
    Cao, Zhengjun
    Markowitch, Olivier
    2008 INTERNATIONAL SEMINAR ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, PROCEEDINGS, 2008, : 157 - +
  • [28] Visual secret sharing with cheating prevention revisited
    Chen, Yu-Chi
    Tsai, Du-Shiau
    Horng, Gwoboa
    DIGITAL SIGNAL PROCESSING, 2013, 23 (05) : 1496 - 1504
  • [29] The Round Complexity of Verifiable Secret Sharing Revisited
    Patra, Arpita
    Choudhary, Ashish
    Rabin, Tal
    Rangan, C. Pandu
    ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 487 - +
  • [30] Visual secret sharing by random grids revisited
    Chen, Tzung-Her
    Tsao, Kai-Hsiang
    PATTERN RECOGNITION, 2009, 42 (09) : 2203 - 2217