Unconditionally Secure Rational Secret Sharing in Standard Communication Networks

被引:0
|
作者
Zhang, Zhifang [1 ]
Liu, Mulan [1 ]
机构
[1] Chinese Acad Sci, Key Lab Math Mechanizat, Acad Math & Syst Sci, Beijing, Peoples R China
关键词
rational secret sharing; epsilon-Nash equilibrium; unconditional security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rational secret sharing protocols in both the two-party and multi-party settings are proposed. These protocols are built in standard communication networks and with unconditional security. Namely, the protocols run over standard point-to-point networks without requiring physical assumptions or simultaneous channels, and even a computationally unbounded player cannot gain more than epsilon by deviating from the protocol. More precisely, for the 2-out-of-2 protocol the epsilon is a negligible function in the size of the secret, which is caused by the information-theoretic MACs used for authentication. The t-out-of-n protocol is (t - 1)-resilient and the epsilon is exponentially small in the number of participants. Although secret recovery cannot be guaranteed in this setting, a participant can at least reduce the Shannon entropy of the secret to less than 1 after the protocol. When the secret-domain is large, every rational player has great incentive to participate in the protocol.
引用
收藏
页码:355 / 369
页数:15
相关论文
共 50 条
  • [41] Secure Secret Sharing in the Cloud
    Chang, Ching-Chun
    Li, Chang-Tsun
    2017 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM), 2017, : 358 - 361
  • [42] Scalable Rational Secret Sharing
    Dani, Varsha
    Movahedi, Mahnush
    Rodriguez, Yamel
    Saia, Jared
    PODC 11: PROCEEDINGS OF THE 2011 ACM SYMPOSIUM PRINCIPLES OF DISTRIBUTED COMPUTING, 2011, : 187 - 196
  • [43] Rational quantum secret sharing
    Huawang Qin
    Wallace K. S. Tang
    Raylin Tso
    Scientific Reports, 8
  • [44] Rational secret sharing, revisited
    Gordon, S. Dov
    Katz, Jonathan
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 229 - 241
  • [45] Rational quantum secret sharing
    Qin, Huawang
    Tang, Wallace K. S.
    Tso, Raylin
    SCIENTIFIC REPORTS, 2018, 8
  • [46] Binary Symmetric Polynomial-Based Protected Fair Secret Sharing and Secure Communication over Satellite Networks
    Guo, Chao
    Pan, Chenglei
    Hu, Guangyu
    Xie, Dingbang
    Zuo, Peiliang
    Han, Yanyan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [47] Secret Sharing: Secure Password Sharing Technique
    Vyas, Hardik A.
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 731 - 735
  • [49] Robust and Secure Secret Sharing in Wireless Networks with Convolutional Network Coding
    Liang, Joyce
    Kuo, C. -C. Jay
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [50] Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model
    Nascimento, ACA
    Mueller-Quade, J
    Otsuka, A
    Hanaoka, G
    Imai, H
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 355 - 368