DocumentCode :
1408117
Title :
Unconditionally secure social secret sharing scheme
Author :
Nojoumian, Mehrdad ; Stinson, D.R. ; Grainger, M.
Author_Institution :
David R. Cheriton Sch. of Comput. Sci., Univ. of Waterloo, Waterloo, ON, Canada
Volume :
4
Issue :
4
fYear :
2010
fDate :
12/1/2010 12:00:00 AM
Firstpage :
202
Lastpage :
211
Abstract :
The authors introduce the notion of a `social secret sharing scheme`, in which shares are allocated based on a player`s reputation and the way he/she interacts with other participants. During the social tuning phase, weights of players are adjusted such that participants who cooperate will end up with more shares than those who defect. Alternatively, newcomers are able to be enrolled in the scheme while corrupted players are disenrolled immediately. In other words, this scheme proactively renews shares at each cycle without changing the secret, and allows trusted participants to gain more authority. The motivation is that, in real-world applications, components of a secure scheme may have different levels of importance (i.e. the number of shares a player has) as well as reputation (i.e. cooperation with other players for the share renewal or secret recovery). Therefore a good construction should balance these two factors, respectively. In the proposed schemes, both the passive and active mobile adversaries are considered in an unconditionally secure setting.
Keywords :
Internet; security of data; active mobile adversary; corrupted players; passive mobile adversary; player reputation; real world application; social tuning phase; unconditionally secure social secret sharing scheme;
fLanguage :
English
Journal_Title :
Information Security, IET
Publisher :
iet
ISSN :
1751-8709
Type :
jour
DOI :
10.1049/iet-ifs.2009.0098
Filename :
5672438
Link To Document :
بازگشت