Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments

被引:1
|
作者
Hsu, Chingfang [1 ]
Harn, Lein [2 ]
Xia, Zhe [3 ]
Bai, Linyan [1 ]
Zhang, Ze [1 ]
机构
[1] Cent China Normal Univ, Comp Sch, Wuhan 430079, Peoples R China
[2] Univ Missouri Kansas City, Dept Comp Sci Elect Engn, Kansas City, MO 64110 USA
[3] Wuhan Univ Technol, Dept Comp Sci, Wuhan 430071, Peoples R China
基金
中国国家自然科学基金;
关键词
Rational secret sharing; Verifiable secret sharing; Asynchronous model; Information-theoretic secure; UCE; Secure group-oriented applications; EFFICIENT; SCHEME;
D O I
10.1186/s13677-022-00364-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, cloud storage services increased the popular for data storage in the cloud and retrieve from any location without any time limitations. One of the most important demands required in cloud is secured data transmission in un-trusted cloud applications. Particularly, secure and efficient multiparty communications in Untrusted Cloud Environments (UCE) attract widespread attentions. The equipment used in UCE have the particularity of being heterogeneous and UCE communication environment are asynchronous networks in which multiple users cannot transmit their messages simultaneously. How to ensure secure communication between these heterogeneous intelligent devices is a major challenge for multiparty communication applied in UCE. In such an asynchronous environment, the asynchronous transmission can cause security problems in cryptographic functions. Therefore, how to implement rational secret sharing (RSS) in an asynchronous model of the UCE networks has become a burning research topic. The RSS refers to finding a solution composed of strategies to encourage players in the secret reconstruction to act honestly even players are rational to act for their own interest. If each player plays the game for the best response to the best response of other players, the game is in Nash equilibrium. The objective of an RSS is to achieve the Nash equilibrium state corresponding to the global optima. In this paper, we propose an information-theoretic secure RSS in asynchronous model for UCE. Our design uses Petersen's VSS to allow every player to divide his share into multiple pieces for other players. Then, shares can be revealed asynchronously. If any player acts maliciously, his share can be recovered by other players. This feature can encourage players to act honestly since any malicious action (i.e., either revealing a fake share or refusing to release one) is useless. Our scheme is practically valuable for secure group-oriented applications in UCE.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] MIMO transmissions with information-theoretic secrecy for secret-key agreement in wireless networks
    Li, Xiaohua
    Ratazzi, E. Paul
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1353 - 1359
  • [22] Full-Duplex Cloud Radio Access Networks: An Information-Theoretic Viewpoint
    Simeone, Osvaldo
    Erkip, Elza
    Shamai, Shlomo
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2014, 3 (04) : 413 - 416
  • [23] A secure online image trading system for untrusted cloud environments
    Munadi, Khairul
    Arnia, Fitri
    Syaryadhi, Mohd
    Fujiyoshi, Masaaki
    Kiya, Hitoshi
    SPRINGERPLUS, 2015, 4
  • [24] Outsourcing Secure MPC to Untrusted Cloud Environments with Correctness Verification
    Bautista, Oscar
    Akkaya, Kemal
    Homsi, Soamar
    PROCEEDINGS OF THE IEEE 46TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2021), 2021, : 178 - 184
  • [25] On Information-Theoretic Secure Multiparty Computation with Local Repairability
    Escudero, Daniel
    Tjuawinata, Ivan
    Xing, Chaoping
    PUBLIC-KEY CRYPTOGRAPHY, PT II, PKC 2024, 2024, 14602 : 205 - 239
  • [26] Systems of Bounded Rational Agents with Information-Theoretic Constraints
    Gottwald, Sebastian
    Braun, Daniel A.
    NEURAL COMPUTATION, 2019, 31 (02) : 440 - 476
  • [27] Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden
    Forouzesh, Moslem
    Azmi, Paeiz
    Kuhestani, Ali
    Yeoh, Phee Lep
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (09) : 7170 - 7181
  • [28] Rational Secret Sharing with Honest Players over an Asynchronous Channel
    Moses, William K., Jr.
    Rangan, C. Pandu
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 414 - 426
  • [29] Secret-Key Generation in Many-to-One Networks: An Integrated Game-Theoretic and Information-Theoretic Approach
    Chou, Remi A.
    Yener, Aylin
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (08) : 5144 - 5159
  • [30] Clustering of Power Networks: An Information-Theoretic Perspective
    Baranwal, Mayank
    Salapaka, Srinivasa M.
    2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 3323 - 3328