Repository landing page

We are not able to resolve this OAI Identifier to the repository landing page. If you are the repository manager for this record, please head to the Dashboard and adjust the settings.

Unconditionally Secure Rational Secret Sharing in Standard Communication Networks

Abstract

Rational secret sharing protocols in both the two-party and multi-party settings are proposed. These protocols are built in standard communication networks and with unconditional security. Namely, the protocols run over standard point-to-point networks without requiring physical assumptions or simultaneous channels, and even a computationally unbounded player cannot gain more than ϵ\epsilon by deviating from the protocol. More precisely, for the 22-out-of-22 protocol the ϵ\epsilon is a negligible function in the size of the secret, which is caused by the information-theoretic MACs used for authentication. The tt-out-of-nn protocol is (t−1)(t-1)-resilient and the ϵ\epsilon is exponentially small in the number of participants. Although secret recovery cannot be guaranteed in this setting, a participant can at least reduce the Shannon entropy of the secret to less than 11 after the protocol. When the secret-domain is large, every rational player has great incentive to participate in the protocol

Similar works

This paper was published in Cryptology ePrint Archive.

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.