Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments

被引:1
|
作者
Hsu, Chingfang [1 ]
Harn, Lein [2 ]
Xia, Zhe [3 ]
Bai, Linyan [1 ]
Zhang, Ze [1 ]
机构
[1] Cent China Normal Univ, Comp Sch, Wuhan 430079, Peoples R China
[2] Univ Missouri Kansas City, Dept Comp Sci Elect Engn, Kansas City, MO 64110 USA
[3] Wuhan Univ Technol, Dept Comp Sci, Wuhan 430071, Peoples R China
基金
中国国家自然科学基金;
关键词
Rational secret sharing; Verifiable secret sharing; Asynchronous model; Information-theoretic secure; UCE; Secure group-oriented applications; EFFICIENT; SCHEME;
D O I
10.1186/s13677-022-00364-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, cloud storage services increased the popular for data storage in the cloud and retrieve from any location without any time limitations. One of the most important demands required in cloud is secured data transmission in un-trusted cloud applications. Particularly, secure and efficient multiparty communications in Untrusted Cloud Environments (UCE) attract widespread attentions. The equipment used in UCE have the particularity of being heterogeneous and UCE communication environment are asynchronous networks in which multiple users cannot transmit their messages simultaneously. How to ensure secure communication between these heterogeneous intelligent devices is a major challenge for multiparty communication applied in UCE. In such an asynchronous environment, the asynchronous transmission can cause security problems in cryptographic functions. Therefore, how to implement rational secret sharing (RSS) in an asynchronous model of the UCE networks has become a burning research topic. The RSS refers to finding a solution composed of strategies to encourage players in the secret reconstruction to act honestly even players are rational to act for their own interest. If each player plays the game for the best response to the best response of other players, the game is in Nash equilibrium. The objective of an RSS is to achieve the Nash equilibrium state corresponding to the global optima. In this paper, we propose an information-theoretic secure RSS in asynchronous model for UCE. Our design uses Petersen's VSS to allow every player to divide his share into multiple pieces for other players. Then, shares can be revealed asynchronously. If any player acts maliciously, his share can be recovered by other players. This feature can encourage players to act honestly since any malicious action (i.e., either revealing a fake share or refusing to release one) is useless. Our scheme is practically valuable for secure group-oriented applications in UCE.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Information-Theoretic Capacity of Clustered Random Networks
    Garetto, Michele
    Nordio, Alessandro
    Chiasserini, Carla-Fabiana
    Leonardi, Emilio
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (11) : 7578 - 7596
  • [32] An information-theoretic approach for detecting communities in networks
    Yongli Li
    Chong Wu
    Zizheng Wang
    Quality & Quantity, 2015, 49 : 1719 - 1733
  • [33] Information-theoretic concepts for the analysis of complex networks
    Dehmer, Matthias
    APPLIED ARTIFICIAL INTELLIGENCE, 2008, 22 (7-8) : 684 - 706
  • [34] An information-theoretic approach for detecting communities in networks
    Li, Yongli
    Wu, Chong
    Wang, Zizheng
    QUALITY & QUANTITY, 2015, 49 (04) : 1719 - 1733
  • [35] Information-Theoretic Limits of Dense Underwater Networks
    Shin, Won-Yong
    Lucani, Daniel E.
    Medard, Muriel
    Stojanovic, Milica
    Tarokh, Vahid
    2011 CONFERENCE RECORD OF THE FORTY-FIFTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS (ASILOMAR), 2011, : 1835 - 1839
  • [36] Information-theoretic variable selection in neural networks
    Kamimura, Ryotaro
    Yoshida, Fumihiko
    Toshie, Yamashita
    Kitajima, Ryozo
    2007 IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTATIONAL INTELLIGENCE, VOLS 1 AND 2, 2007, : 222 - +
  • [37] Information-theoretic Capacity of Clustered Random Networks
    Garetto, Michele
    Nordio, Alessandro
    Chiasserini, Carla F.
    Leonardi, Emilio
    2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 1698 - 1702
  • [38] Information-theoretic relaying for multicast in wireless networks
    Maric, Ivana
    Goldsmith, Andrea
    Medard, Muriel
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 3071 - +
  • [39] AN EFFICIENT AND INFORMATION THEORETICALLY SECURE RATIONAL SECRET SHARING SCHEME BASED ON SYMMETRIC BIVARIATE POLYNOMIALS
    Tartary, Christophe
    Wang, Huaxiong
    Zhang, Yun
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (06) : 1395 - 1416
  • [40] Information-theoretic Key Encapsulation and its Application to Secure Communication
    Sharifian, Setareh
    Safavi-Naini, Reihaneh
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 2393 - 2398