Skip to main content

A Rational Secret Sharing Protocol with Unconditional Security in the Synchronous Setting

  • Conference paper
Information Security and Privacy (ACISP 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7959))

Included in the following conference series:

  • 1662 Accesses

Abstract

In order to realize unconditionally secure rational secret sharing over a synchronous (non-simultaneous) channel, previous works either rely on the existence of honest players or induce the approximate notion of ε-Nash equilibrium. In this paper, we design two rational t-out-of-n secret sharing protocols for \(t<\lceil\frac{n}{3}\rceil\) and \(t<\lceil\frac{n}{2}\rceil\) respectively, which achieve unconditional security and run in the synchronous setting without requiring any honest player. The former protocol is based on the use of verifiable secret sharing, and the latter protocol extends the former one by using the information checking protocol. Moreover, both of our protocols achieve an enhanced notion of \(\mathcal{C}\) -resilient strict Nash equilibrium (\(\mathcal{C}\) consists of the coalitions of less than t players), which guarantees that the prescribed strategy is the only best response even for colluding players, and is stronger than ε-Nash equilibrium.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, PODC 2006, pp. 53–62. ACM, New York (2006)

    Chapter  Google Scholar 

  2. Asharov, G., Lindell, Y.: Utility dependence in correct and fair rational secret sharing. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 559–576. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  3. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: STOC 1988: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, pp. 1–10. ACM, New York (1988)

    Chapter  Google Scholar 

  4. Cramer, R., Damgård, I., Maurer, U.: General secure multi-party computation from any linear secret-sharing scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316–334. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  5. Fuchsbauer, G., Katz, J., Naccache, D.: Efficient rational secret sharing in standard communication networks. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 419–436. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Gordon, S.D., Katz, J.: Rational secret sharing, revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 229–241. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Halpern, J.Y., Pass, R.: A computational game-theoretic framework for cryptography (2009)

    Google Scholar 

  8. Halpern, J.Y., Teague, V.: Rational secret sharing and multiparty computation: extended abstract. In: Proceedings of the Thirty-Sixth Annual ACM Symposium on Theory of Computing, STOC 2004, pp. 623–632 (2004)

    Google Scholar 

  9. Moses Jr., W.K., Pandu Rangan, C.: Rational secret sharing over an asynchronous broadcast channel with information theoretic security. CoRR, abs/1112.4033 (2011)

    Google Scholar 

  10. Kol, G., Naor, M.: Games for exchanging information. In: STOC, pp. 423–432 (2008)

    Google Scholar 

  11. Lysyanskaya, A., Triandopoulos, N.: Rationality and adversarial behavior in multi-party computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 180–197. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Ong, S.J., Parkes, D.C., Rosen, A., Vadhan, S.: Fairness with an honest minority and a rational majority. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 36–53. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  13. Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing, STOC 1989, pp. 73–85. ACM, New York (1989)

    Chapter  Google Scholar 

  14. Zhang, Y., Tartary, C., Wang, H.: An efficient rational secret sharing scheme based on the chinese remainder theorem. In: Parampalli, U., Hawkes, P. (eds.) ACISP 2011. LNCS, vol. 6812, pp. 259–275. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  15. Zhang, Z., Liu, M.: Unconditionally secure rational secret sharing in standard communication networks. In: Rhee, K.-H., Nyang, D. (eds.) ICISC 2010. LNCS, vol. 6829, pp. 355–369. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yu, Y., Zhou, Z. (2013). A Rational Secret Sharing Protocol with Unconditional Security in the Synchronous Setting. In: Boyd, C., Simpson, L. (eds) Information Security and Privacy. ACISP 2013. Lecture Notes in Computer Science, vol 7959. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39059-3_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39059-3_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39058-6

  • Online ISBN: 978-3-642-39059-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics