Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments

被引:1
|
作者
Hsu, Chingfang [1 ]
Harn, Lein [2 ]
Xia, Zhe [3 ]
Bai, Linyan [1 ]
Zhang, Ze [1 ]
机构
[1] Cent China Normal Univ, Comp Sch, Wuhan 430079, Peoples R China
[2] Univ Missouri Kansas City, Dept Comp Sci Elect Engn, Kansas City, MO 64110 USA
[3] Wuhan Univ Technol, Dept Comp Sci, Wuhan 430071, Peoples R China
基金
中国国家自然科学基金;
关键词
Rational secret sharing; Verifiable secret sharing; Asynchronous model; Information-theoretic secure; UCE; Secure group-oriented applications; EFFICIENT; SCHEME;
D O I
10.1186/s13677-022-00364-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, cloud storage services increased the popular for data storage in the cloud and retrieve from any location without any time limitations. One of the most important demands required in cloud is secured data transmission in un-trusted cloud applications. Particularly, secure and efficient multiparty communications in Untrusted Cloud Environments (UCE) attract widespread attentions. The equipment used in UCE have the particularity of being heterogeneous and UCE communication environment are asynchronous networks in which multiple users cannot transmit their messages simultaneously. How to ensure secure communication between these heterogeneous intelligent devices is a major challenge for multiparty communication applied in UCE. In such an asynchronous environment, the asynchronous transmission can cause security problems in cryptographic functions. Therefore, how to implement rational secret sharing (RSS) in an asynchronous model of the UCE networks has become a burning research topic. The RSS refers to finding a solution composed of strategies to encourage players in the secret reconstruction to act honestly even players are rational to act for their own interest. If each player plays the game for the best response to the best response of other players, the game is in Nash equilibrium. The objective of an RSS is to achieve the Nash equilibrium state corresponding to the global optima. In this paper, we propose an information-theoretic secure RSS in asynchronous model for UCE. Our design uses Petersen's VSS to allow every player to divide his share into multiple pieces for other players. Then, shares can be revealed asynchronously. If any player acts maliciously, his share can be recovered by other players. This feature can encourage players to act honestly since any malicious action (i.e., either revealing a fake share or refusing to release one) is useless. Our scheme is practically valuable for secure group-oriented applications in UCE.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Proactive secret sharing in asynchronous networks with unreliable links
    Guo, Yuan-Bo
    Ma, Jian-Feng
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2004, 32 (03): : 399 - 403
  • [42] A Secure Duplicate Data Sharing Method against Untrusted Cloud Service Provider
    Wang, Jiawei
    He, Junjiang
    Li, Wenshan
    Lan, Xiaolong
    Liu, Qian
    Li, Tao
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 352 - 359
  • [43] Coding Theoretic Study of Secure Network Coding and Quantum Secret Sharing
    Matsumoto, Ryutaroh
    2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 335 - 337
  • [44] Transmit Control for Secure Information Sharing in Untrusted Relay with Two Antennas
    Noguchi, Tetsuya
    Takyu, Osamu
    Sasamori, Fumihito
    Handa, Shiro
    Fujii, Takeo
    Ohtsuki, Tomoaki
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 771 - 775
  • [45] A Note on Information-Theoretic Secret Key Exchange over Wireless Channels
    Zafer, Murtaza A.
    Agrawal, Dakshi
    Srivatsa, Mudhakar
    2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 754 - 761
  • [46] Structure Analysis of Email Networks by Information-Theoretic Clustering
    Huang, Yinghu
    Wang, Guoyin
    ADVANCES IN NEURAL NETWORKS - ISNN 2010, PT 2, PROCEEDINGS, 2010, 6064 : 416 - 425
  • [47] Information-theoretic multi-hopping for relay networks
    Kramer, G
    Gupta, P
    Gastpar, M
    2004 INTERNATIONAL ZURICH SEMINAR ON COMMUNICATIONS: ACCESS-TRANSMISSION-NETWORKING, PROCEEDINGS, 2004, : 192 - 195
  • [48] Secure image secret sharing over distributed cloud network
    Wu, Xiaotian
    Yang, Ching-Nung
    Li, Jian-Ming
    SIGNAL PROCESSING, 2021, 178
  • [49] Multiuser cognitive radio networks: an information-theoretic perspective
    Nagananda, K. G.
    Mohapatra, Parthajit
    Murthy, Chandra R.
    Kishore, Shalinee
    INTERNATIONAL JOURNAL OF ADVANCES IN ENGINEERING SCIENCES AND APPLIED MATHEMATICS, 2013, 5 (01) : 43 - 65
  • [50] An information-theoretic model for link prediction in complex networks
    Boyao Zhu
    Yongxiang Xia
    Scientific Reports, 5