DocumentCode :
1539605
Title :
Coding Theorems for a (2,2) -Threshold Scheme With Detectability of Impersonation Attacks
Author :
Iwamoto, Mitsugu ; Koga, Hiroki ; Yamamoto, Hirosuke
Author_Institution :
Center of Frontier Science and Engineering, University of Electro-Communications, Tokyo, Japan
Volume :
58
Issue :
9
fYear :
2012
Firstpage :
6194
Lastpage :
6206
Abstract :
Coding theorems on a (2,2) -threshold scheme with an opponent are discussed in an asymptotic setup, where the opponent tries to impersonate one of the two participants. A situation is considered where n secrets S^{n} from a memoryless source is blockwisely encoded to two shares and the two shares are decoded to S^{n} with permitting negligible decoding error. We introduce correlation level of the two shares and characterize the minimum attainable rates of the shares and a uniform random number for realizing a (2, 2) -threshold scheme that is secure against the impersonation attack by the opponent. It is shown that if the correlation level between the two shares equals to \\ell \\geq 0 , the minimum attainable rates coincide with H(S)+\\ell , where H(S) denotes the entropy of the source, and the maximum attainable exponent of the success probability of the impersonation attack equals to \\ell . It is also shown that a simple scheme using an ordinary (2,2) -threshold scheme attains all the bounds as well.
Keywords :
Correlation; Cryptography; Decoding; Encoding; Entropy; Probability distribution; Tin; Correlated sources; hypothesis testing; impersonation attack; secret sharing scheme; threshold scheme;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.2012.2204546
Filename :
6217310
Link To Document :
بازگشت