Louis Cianciullo, H. Ghodosi, Kovel Thuremilla, A. C. Prihandoko
{"title":"强t一致性中的缺陷","authors":"Louis Cianciullo, H. Ghodosi, Kovel Thuremilla, A. C. Prihandoko","doi":"10.1109/ICOMITEE.2019.8921313","DOIUrl":null,"url":null,"abstract":"Secret sharing is a cryptographic primitive used to securely distribute a secret value S among n participants such that only predetermined subsets of these participants (called access sets) can later reconstruct S. Such a scheme is said to be secure in the information theoretic setting if an adversary with unlimited computational power cannot reduce uncertainty regarding S.Harn and Lin proposed a strong (n, t, n) secret sharing scheme which they claim is information theoretic secure. In this paper we show that this is not the case and that the notion of strong t-consistency used by Harn and Lin as well as Liu et al. actually results in an imperfect scheme that is not secure in the information theoretic setting.","PeriodicalId":137739,"journal":{"name":"2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)","volume":"95 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Flaws in Strong t-Consistency\",\"authors\":\"Louis Cianciullo, H. Ghodosi, Kovel Thuremilla, A. C. Prihandoko\",\"doi\":\"10.1109/ICOMITEE.2019.8921313\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Secret sharing is a cryptographic primitive used to securely distribute a secret value S among n participants such that only predetermined subsets of these participants (called access sets) can later reconstruct S. Such a scheme is said to be secure in the information theoretic setting if an adversary with unlimited computational power cannot reduce uncertainty regarding S.Harn and Lin proposed a strong (n, t, n) secret sharing scheme which they claim is information theoretic secure. In this paper we show that this is not the case and that the notion of strong t-consistency used by Harn and Lin as well as Liu et al. actually results in an imperfect scheme that is not secure in the information theoretic setting.\",\"PeriodicalId\":137739,\"journal\":{\"name\":\"2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)\",\"volume\":\"95 2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOMITEE.2019.8921313\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOMITEE.2019.8921313","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secret sharing is a cryptographic primitive used to securely distribute a secret value S among n participants such that only predetermined subsets of these participants (called access sets) can later reconstruct S. Such a scheme is said to be secure in the information theoretic setting if an adversary with unlimited computational power cannot reduce uncertainty regarding S.Harn and Lin proposed a strong (n, t, n) secret sharing scheme which they claim is information theoretic secure. In this paper we show that this is not the case and that the notion of strong t-consistency used by Harn and Lin as well as Liu et al. actually results in an imperfect scheme that is not secure in the information theoretic setting.