Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2332432.2332453acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
abstract

Brief announcement: optimal amortized secret sharing with cheater identification

Published: 16 July 2012 Publication History

Abstract

We consider the problem of k-out-of-n secret sharing, capable of identifying up to t cheaters, with probability at least (1 - ε), for a given error parameter ε. In any such secret sharing scheme, t < k/2 and the lower bound of |Vi| ≥ |S| - 1 / ε + 1 holds. Here Vi denotes the set of all possible ith share, that can be assigned to the ith party and S denotes the set of all possible secrets. To the best of our knowledge, there does not exist any computationally efficient secret sharing scheme with k = 2t+1 (the minimum value of k), where |Vi| exactly matches the lower bound. We show that it is possible to match this bound in the amortized sense.

References

[1]
T. Johansson, G. Kabatianskii, and B. J. M. Smeets. On the relation between A-codes and codes correcting independent errors. In EUROCRYPT, pages 1--11, 1993.
[2]
K. Kurosawa, S. Obana, and W. Ogata. t-cheater identifiable (k, n) threshold secret sharing schemes. In CRYPTO, pages 410--423, 1995.
[3]
R. J. McEliece and D. V. Sarwate. On sharing secrets and Reed Solomon codes. Communications of the ACM, 24(9):583--584, 1981.
[4]
S. Obana. Almost optimum t-cheater identifiable secret sharing schemes. In EUROCRYPT, pages 284--302, 2011.
[5]
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612--613, 1979.

Cited By

View all
  • (2018)Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and RobustnessInformation Security Practice and Experience10.1007/978-3-319-99807-7_37(578-594)Online publication date: 6-Sep-2018
  • (2018)Secret Sharing Schemes on Compartmental Access Structure in Presence of CheatersInformation Systems Security10.1007/978-3-030-05171-6_9(171-188)Online publication date: 5-Dec-2018
  • (2017)Secret Sharing with Cheaters Using Multi-Receiver AuthenticationIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.E100.A.115E100.A:1(115-125)Online publication date: 2017
  • Show More Cited By

Index Terms

  1. Brief announcement: optimal amortized secret sharing with cheater identification

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      PODC '12: Proceedings of the 2012 ACM symposium on Principles of distributed computing
      July 2012
      410 pages
      ISBN:9781450314503
      DOI:10.1145/2332432

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 16 July 2012

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tag

      1. information theoretic security

      Qualifiers

      • Abstract

      Conference

      PODC '12
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 740 of 2,477 submissions, 30%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 03 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and RobustnessInformation Security Practice and Experience10.1007/978-3-319-99807-7_37(578-594)Online publication date: 6-Sep-2018
      • (2018)Secret Sharing Schemes on Compartmental Access Structure in Presence of CheatersInformation Systems Security10.1007/978-3-030-05171-6_9(171-188)Online publication date: 5-Dec-2018
      • (2017)Secret Sharing with Cheaters Using Multi-Receiver AuthenticationIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.E100.A.115E100.A:1(115-125)Online publication date: 2017
      • (2016)Efficient Threshold Secret Sharing Schemes Secure Against Rushing CheatersInformation Theoretic Security10.1007/978-3-319-49175-2_1(3-23)Online publication date: 10-Nov-2016
      • (2014)An Efficient Robust Secret Sharing Scheme with Optimal Cheater ResiliencySecurity, Privacy, and Applied Cryptography Engineering10.1007/978-3-319-12060-7_4(47-58)Online publication date: 2014
      • (2014)Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite FieldAdvances in Information and Computer Security10.1007/978-3-319-09843-2_7(88-97)Online publication date: 2014
      • (2014)Cheater Identifiable Secret Sharing Schemes via Multi-Receiver AuthenticationAdvances in Information and Computer Security10.1007/978-3-319-09843-2_6(72-87)Online publication date: 2014
      • (2013)On Cheater Identifiable Secret Sharing Schemes Secure against Rushing AdversaryAdvances in Information and Computer Security10.1007/978-3-642-41383-4_17(258-271)Online publication date: 2013
      • (2013)On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating DetectionProceedings of the 14th International Conference on Progress in Cryptology — INDOCRYPT 2013 - Volume 825010.1007/978-3-319-03515-4_12(179-196)Online publication date: 7-Dec-2013

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media