Skip to main content

Necessary and Sufficient Numbers of Cards for Sharing Secret Keys on Hierarchical Groups

(Extended Abstracts)

  • Conference paper
  • First Online:
  • 1558 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2223))

Abstract

Suppose that there are players in two hierarchical groups and a computationally unlimited eavesdropper. Using a random deal of cards, a player in the higher group wishes to send a one-bit message information-theoretically securely either to all the players in her group or to all the players in the two groups. This can be done by the socalled 2-level key set protocol. In this paper we give a necessary and su.cient condition for the 2-level key set protocol to succeed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. J. Fischer, M. S. Paterson, and C. Racko., “Secret bit transmission using a random deal of cards,” DIMACS Series in Discrete Mathematics and Theoretical Computer Science, AMS, vol. 2, pp. 173–181, 1991.

    Google Scholar 

  2. M. J. Fischer and R. N. Wright, “An application of game-theoretic techniques to cryptography,” DIMACS Series in Discrete Mathematics and Theoretical Computer Science, AMS, vol. 13, pp. 99–118, 1993.

    MathSciNet  MATH  Google Scholar 

  3. M. J. Fischer and R. N. Wright, “An e.cient protocol for unconditionally secure secret key exchange,” Proc. of the 4th Annual Symposium on Discrete Algorithms, pp. 475–483, 1993.

    Google Scholar 

  4. M. J. Fischer and R. N. Wright, “Bounds on secret key exchange using a random deal of cards,” J. Cryptology, vol. 9, pp. 71–99, 1996.

    Article  MathSciNet  MATH  Google Scholar 

  5. M. J. Fischer and R. N. Wright, “Multiparty secret key exchange using a random deal of cards,” Proc. CRYPTO’ 91, Lecture Notes in Computer Science, Springer-Verlag, vol. 576, pp. 141–155, 1992.

    MATH  Google Scholar 

  6. F. Harary, “Graph Theory,” Addison-Wesley, Reading, Mass., 1969.

    Google Scholar 

  7. T. Mizuki, “Sharing Unconditionally Secure Secret Keys,” Ph.D. Thesis, Tohoku University, Sendai, 2000. Available at http://www.nishizeki.ecei.tohoku.ac.jp/~mizuki/thesis.ps.

  8. T. Mizuki, H. Shizuya, and T. Nishizeki, “Characterization of optimal key set protocols,” Proc. IFIP TCS 2000, Lecture Notes in Computer Science, Springer-Verlag, vol. 1872, pp. 273–285, 2000.

    MATH  Google Scholar 

  9. T. Mizuki, H. Shizuya, and T. Nishizeki, “Dealing necessary and su.cient numbers of cards for sharing a one-bit secret key,” Proc. EUROCRYPT’ 99, Lecture Notes in Computer Science, Springer-Verlag, vol. 1592, pp. 389–401, 1999. 197, 199

    MATH  Google Scholar 

  10. R. Yoshikawa, S. Guo, K. Motegi, and Y. Igarashi, “Construction of secret key exchange spanning trees by random deals of cards on hierarchical structures,” IEICE Trans. Fundamentals, vol. E84-A, no. 5, pp. 1110–1119, 2001.

    Google Scholar 

  11. R. Yoshikawa, S. Guo, K. Motegi, and Y. Igarashi, “Secret key exchange using random deals of cards on hierarchical structures,” Proc. ISAAC 2000, Lecture Notes in Computer Science, Springer-Verlag, vol. 1969, pp. 290–301, 2000.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mizuki, T., Nishizeki, T. (2001). Necessary and Sufficient Numbers of Cards for Sharing Secret Keys on Hierarchical Groups. In: Eades, P., Takaoka, T. (eds) Algorithms and Computation. ISAAC 2001. Lecture Notes in Computer Science, vol 2223. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45678-3_18

Download citation

  • DOI: https://doi.org/10.1007/3-540-45678-3_18

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42985-2

  • Online ISBN: 978-3-540-45678-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics