Special Section Correspondence Distributed Secret Sharing for Discrete Memoryless Networks

نویسندگان

  • William Luh
  • Deepa Kundur
چکیده

This correspondence studies the distributed secret sharing problem which is a twist of the classical secret sharing problem. In this new problem, each user needs to encode his or her own unique secret message without collaboration with other users and without the use of any common secret materials or cryptographic keys. The goal is to ensure that an adversary without access to all of the encoded messages learns as little as possible about the secret messages, while a legitimate joint decoder with all the encoded messages can decode all of them without cryptographic keys. Furthermore the users do not know the channels that will be compromised ahead of time, and thus must protect all channels. Specifically, we study two related variants of this problem. The first problem deals with source coding and secrecy, while the second problem deals with channel coding and secrecy. From the results of these two problems, we conclude that interference is necessary for unconditional secrecy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves

‎In a (t,n)-threshold secret sharing scheme‎, ‎a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together‎, ‎but no group of fewer than t participants can do‎. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao‎, ‎and the intractability of the elliptic curve discrete logar...

متن کامل

Security Analysis of a Hash-Based Secret Sharing Scheme

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

متن کامل

Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks

Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks P.V. Siva Kumar Department of Computer Science and Engineering, VNR VJIET, Hyderabad, India Email: [email protected] Dr. Rajasekhara Rao Kurra Sri Prakash College of Engineering, Tuni, India, email: [email protected]. in Appala Naidu Tentu and G.Padmavathi CRRao AIMSCS, University of Hyderabad Ca mp us , Hyderabad , I nd ia ...

متن کامل

Sharing several secrets based on Lagrange's interpolation formula and Cipher feedback mode

In a multi-secret sharing scheme, several secret values are distributed among a set of n participants.In 2000 Chien et al.'s proposed a (t; n) multi-secret sharing scheme. Many storages and publicvalues required in Chien's scheme. Motivated by these concerns, some new (t; n) multi-secret sharingschemes are proposed in this paper based on the Lagrange interpolation formula for polynomials andcip...

متن کامل

Distributed Contingency Logic and Security

In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008