Ramp secret sharing with cheater identification in presence of rushing cheaters

IF 0.1 Q4 MATHEMATICS
Jyotirmoy Pramanik, A. Adhikari
{"title":"Ramp secret sharing with cheater identification in presence of rushing cheaters","authors":"Jyotirmoy Pramanik, A. Adhikari","doi":"10.1515/gcc-2019-2006","DOIUrl":null,"url":null,"abstract":"Abstract Secret sharing allows one to share a piece of information among n participants in a way that only qualified subsets of participants can recover the secret whereas others cannot. Some of these participants involved may, however, want to forge their shares of the secret(s) in order to cheat other participants. Various cheater identifiable techniques have been devised in order to identify such cheaters in secret sharing schemes. On the other hand, Ramp secret sharing schemes are a practically efficient variant of usual secret sharing schemes with reduced share size and some loss in security. Ramp secret sharing schemes have many applications in secure information storage, information-theoretic private information retrieval and secret image sharing due to producing relatively smaller shares. However, to the best of our knowledge, there does not exist any cheater identifiable ramp secret sharing scheme. In this paper we define the security model for cheater identifiable ramp secret sharing schemes and provide two constructions for cheater identifiable ramp secret sharing schemes. In addition, the second construction is secure against rushing cheaters who are allowed to submit their shares during secret reconstruction after observing other participants’ responses in one round. Also, we do not make any computational assumptions for the cheaters, i.e., cheaters may be equipped with unlimited time and resources, yet, the cheating probability would be bounded above by a very small positive number.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"79 1","pages":"103 - 113"},"PeriodicalIF":0.1000,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Groups Complexity Cryptology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1515/gcc-2019-2006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"MATHEMATICS","Score":null,"Total":0}
引用次数: 7

Abstract

Abstract Secret sharing allows one to share a piece of information among n participants in a way that only qualified subsets of participants can recover the secret whereas others cannot. Some of these participants involved may, however, want to forge their shares of the secret(s) in order to cheat other participants. Various cheater identifiable techniques have been devised in order to identify such cheaters in secret sharing schemes. On the other hand, Ramp secret sharing schemes are a practically efficient variant of usual secret sharing schemes with reduced share size and some loss in security. Ramp secret sharing schemes have many applications in secure information storage, information-theoretic private information retrieval and secret image sharing due to producing relatively smaller shares. However, to the best of our knowledge, there does not exist any cheater identifiable ramp secret sharing scheme. In this paper we define the security model for cheater identifiable ramp secret sharing schemes and provide two constructions for cheater identifiable ramp secret sharing schemes. In addition, the second construction is secure against rushing cheaters who are allowed to submit their shares during secret reconstruction after observing other participants’ responses in one round. Also, we do not make any computational assumptions for the cheaters, i.e., cheaters may be equipped with unlimited time and resources, yet, the cheating probability would be bounded above by a very small positive number.
坡道秘密共享与作弊者识别在匆忙的作弊者面前
摘要秘密共享允许在n个参与者之间共享一条信息,只有符合条件的参与者子集才能恢复该秘密,而其他参与者则不能。然而,其中一些参与者可能想要伪造他们的秘密份额,以欺骗其他参与者。为了在秘密共享方案中识别这些作弊者,已经设计了各种识别作弊者的技术。另一方面,Ramp秘密共享方案是常规秘密共享方案的一种实际有效的变体,它减小了共享大小,但在安全性上有一定的损失。斜坡秘密共享方案由于产生相对较小的共享,在安全信息存储、信息论私有信息检索和秘密图像共享等方面有着广泛的应用。然而,据我们所知,不存在任何可识别作弊者的斜坡秘密共享方案。本文定义了骗子可识别匝道秘密共享方案的安全模型,并给出了骗子可识别匝道秘密共享方案的两种结构。此外,第二次构建是安全的,防止匆忙的作弊者在观察其他参与者的反应后,在秘密重建期间提交自己的份额。同时,我们没有对作弊者做任何计算上的假设,即作弊者可能拥有无限的时间和资源,但是作弊的概率会被一个非常小的正数所限制。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
1.10
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信