Rational Fair Secret Sharing Scheme

被引:0
|
作者
Liu H. [1 ,2 ,3 ]
Li X.-H. [4 ,5 ]
Tian Y.-L. [3 ,6 ]
Luo B. [4 ,5 ]
Ma J.-F. [3 ,4 ,5 ]
Peng C.-G. [3 ,6 ]
机构
[1] School of Information, Guizhou University of Finance and Economics, Guiyang
[2] International Joint Research Center for Data Science and High-Performance Computing, Guizhou University of Finance and Economics, Guiyang
[3] State Key Laboratory of Public Big Data, Guizhou University, Guiyang
[4] School of Cyber Engineering, Xidian University, Xi'an
[5] State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an
[6] College of Computer Science and Technology, Guizhou University, Guiyang
来源
基金
中国国家自然科学基金;
关键词
Access structure; Incentive mechanism; Obfuscation; Rational fairness; Rational secret sharing;
D O I
10.11897/SP.J.1016.2020.01517
中图分类号
学科分类号
摘要
With the development of communication technologies, the advanced technologies like cloud computing and IoT (Internet of Things) are emerging, which bring convenience and become part of our daily life. Unfortunately, when enjoying the convenient life, the users' privacy may disclose because they need to provide some individual sensitive data. To protect the users' privacy effectively, the cryptography participating in multi-user has attracted more attention, especially secret sharing. Secret sharing is one of the most common and classical distributed cryptographic schemes, which allows the certain number of users can obtain the secret together, but any subset of users of size less than the prescribed number cannot obtain the secret even they collude with others. In traditional secret sharing, the users are regarded as either honest or malicious. Honest users follow the prescribed scheme faithfully, whereas malicious users behave in arbitrary manners. However, in real applications, the users are selfish and always try to maximize their profits, which coincides with the selfish characteristic of rational users in game theory. Under this circumstance, rational secret sharing is proposed by introducing selfish users into traditional secret sharing, which assumes that the users prefer to obtain the secret above all else, otherwise prefer the fewest number of other users to obtain the secret. The purpose is to realize the fair secret reconstruction in real applications. Unfortunately, when directly adopting the existing rational secret sharing schemes, some unfair solutions arise, which lead that some of the users reconstruct the secret but not send the shares, whereas the others cannot obtain the secret after sending the shares. More seriously, some of the users can cheat the other users into viewing a fake secret as the real. The crucial reason is that, the users' selfish behaviors are not considered completely in the existing fairness definition of rational secret sharing, and the existing schemes are devised under the guidance of this fairness definition. To address this problem, this paper formalizes rational fairness of secret sharing by combining it with the minimum access structure, and demonstrates that the proposed definition allows the users to reconstruct the real secret only when both of them send the shares honestly. Furthermore, to show that the proposed fairness definition is meaningful, an incentive obfuscation mechanism is devised and an advanced rational secret sharing scheme is presented. In the proposal, a great quantity of fake shares are generated for rational users to make them not able to identify the real one, and the users are punished by not receiving any shares in the future when they do not send the shares honestly. In this way, none of users deviates from the scheme prescribed, thereby realizing the fair secret reconstruction. Through the comparisons of the existing schemes in applicable scenarios, reconstruction rounds, requirements on trust users, computation of rational users' payments, and other complicated cryptographic tools, the advantages of our scheme are analyzed to illustrate the usability. Additionally, the extensive experiments illustrate that the computation overhead and communication cost of the presented scheme are limited, indicating that our scheme can realize the fair secret reconstruction efficiently. © 2020, Science Press. All right reserved.
引用
收藏
页码:1517 / 1533
页数:16
相关论文
共 40 条
  • [1] Cao Z F., New Directions of Modern Cryptography, (2012)
  • [2] Fu A, Qin N, Wang Y, Et al., Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t,n) secret sharing for LTE/LTE-A networks, Wireless Networks, 23, 7, pp. 2165-2176, (2017)
  • [3] Maitraye D, Nusrat J M, Sharmin A, Et al., A novel secret sharing approach for privacy-preserving authenticated disease risk queries in genomic databases, Proceedings of the 42nd Annual International Conference on Computer Software and Applications (COMPSAC 2018), pp. 645-654, (2018)
  • [4] Liu H, Li X H, Xu M F, Et al., A fair data access control towards rational users in cloud storage, Information Sciences, 418, pp. 258-271, (2017)
  • [5] Leon J H, Gamze T, Zekeriya E., BAdASS: Preserving privacy in behavioural advertising with applied secret sharing, Proceedings of the 12th International Conference on Provable Security (ProvSec 2018), pp. 397-405, (2018)
  • [6] Mahdi C., Nearly optimal robust secret sharing, Designs, Codes and Cryptography, 87, 8, pp. 1777-1796, (2019)
  • [7] Halpern J, Teague V., Rational secret sharing and multiparty computation: Extended abstract, Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC 2004), pp. 623-632, (2004)
  • [8] Dodis Y, Rabin T., Cryptography and Game Theory, (2007)
  • [9] Katz J., Bridging game theory and cryptography: Recent results and future directions, Proceedings of the 5th International Conference on Theory of Cryptography (TCC 2008), pp. 251-272, (2008)
  • [10] Nanavati N R, Jinwala D C., A game theory based repeated rational secret sharing scheme for privacy preserving distributed data mining, Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT 2013), pp. 512-517, (2013)