On cheating immune secret sharing

被引:0
|
作者
Pieprzyk, J [1 ]
Zhang, XM [1 ]
机构
[1] Macquarie Univ, Dept Comp, Ctr Adv Comp Algorithms & Cryptog, Sydney, NSW 2109, Australia
关键词
secret sharing; cheating prevention; cheating immune;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong boolean functions. In particular, we prove that for given secret sharing, the average cheating probability over all cheating vectors and all original vectors, i.e., 1/n.2(-n)Sigma(c)(n)= 1Sigmaalphaepsilonnuetarhoc,alpha, denoted by p ($) over bar, satisfies p ($) over bar greater than or equal to1/ 2, and the equality holds if and only if rhoc,alpha satisfies rhoc,alphaa = 1/2 for every cheating vector delta(c) and every original vector a. In this case the secret sharing is said to be cheating immune. We further establish a relationship between cheating-immune secret sharing and cryptographic criteria of boolean functions. This enables us to construct cheating-immune secret sharing.
引用
收藏
页码:253 / 264
页数:12
相关论文
共 50 条
  • [1] Strictly cheating immune secret sharing
    Zhang, J
    Wen, QY
    [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 514 - 519
  • [2] Cheating Immune Threshold Visual Secret Sharing
    De Prisco, Roberto
    De Santis, Alfredo
    [J]. COMPUTER JOURNAL, 2010, 53 (09): : 1485 - 1496
  • [3] Further Results of Cheating Immune Secret Sharing
    ZHANG Jie~(1
    2.State Key Laboratory of Information Security
    [J]. The Journal of China Universities of Posts and Telecommunications, 2004, (04) : 26 - 28
  • [4] Cheating immune (2, n)-threshold visual secret sharing
    De Prisco, Roberto
    De Santis, Alfredo
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 216 - 228
  • [5] Properties and constraints of cheating-immune secret sharing schemes
    D'Arco, P
    Kishimoto, W
    Stinson, DR
    [J]. DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 219 - 233
  • [6] Cheating Resistance for Secret Sharing
    Chan, Chao-Wen
    Chang, Chin-Chen
    Wang, Zhi-Hui
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 840 - +
  • [7] On constructing 1-cheating immune secret-sharing functions
    Zhang, WeiGuo
    Sun, Xi
    Yang, JunPo
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89 (01) : 30 - 34
  • [8] Improving the propagation characteristics of Boolean function and cheating immune secret sharing
    Zhang, J
    Wen, QY
    [J]. 2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2389 - 2392
  • [10] Cheating prevention in linear secret sharing
    Pieprzyk, J
    Zhang, XM
    [J]. INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 121 - 135