DocumentCode :
2427114
Title :
Rational Secret Sharing Information -- Theoretically Secure against Adaptive Adversaries
Author :
Yang Yu ; Zhanfei Zhou
Author_Institution :
State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
fYear :
2013
fDate :
16-18 July 2013
Firstpage :
249
Lastpage :
256
Abstract :
Most rational secret sharing protocols aim to achieve a more appealing equilibrium or resist adversaries. However, all previous protocols achieve resilience against irrational adversaries at the cost of inducing a weak guarantee of Nash equilibrium surviving iterated deletion, which has been proved weaker than strict Nash equilibrium. Moreover, they achieve equilibrium in a computational way based on the computational limitations of adversaries. In this paper, we design two unconditionally secure rational (t, n) secret sharing protocols. Contrary to prior works, our protocols induce an enhanced notion of strict equilibrium with respect to adversary structure A, and resist the computationally unbounded and adaptive adversary without using cryptographic primitives. Our protocols achieve stronger stability, since rational players have an incentive not to deviate no matter how the adversary behaves, and they are immune to the backward induction. Our protocols are secure against the adversary corrupting less than [n/3] players and the adversary corrupting less than [n/2]-1 players respectively. Both of them achieve utility independence.
Keywords :
cryptographic protocols; game theory; adaptive adversary; adversary structure; backward induction; computationally unbounded adversary; irrational adversary; iterated deletion; rational players; rational secret sharing information; rational secret sharing protocols; strict Nash equilibrium; utility independence; Cryptography; Games; History; Nash equilibrium; Polynomials; Protocols; adaptive; irrational adversary; rational secret sharing; strict equilibrium; unconditionally secure;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
Type :
conf
DOI :
10.1109/TrustCom.2013.34
Filename :
6680848
Link To Document :
بازگشت