TY - GEN
T1 - Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters Based on Message Authentication
AU - Hayashi, Masahito
AU - Koshiba, Takeshi
N1 - Publisher Copyright:
© 2018 IEEE.
Copyright:
Copyright 2018 Elsevier B.V., All rights reserved.
PY - 2018/8/15
Y1 - 2018/8/15
N2 - For conventional secret sharing, if cheaters can submit possibly forged shares after observing shares of the honest users in the reconstruction phase, they can disturb the protocol and only they can reconstruct the true secret. To overcome the problem, secret sharing scheme with properties of cheater-identification have been proposed. Existing protocols for cheater-identifiable secret sharing assumed non-rushing cheaters or honest majority. In this paper, using message authentication, we remove both conditions simultaneously, and give its universal construction from any secret sharing scheme. To resolve this end, we explicitly propose the concepts of 'individual identification' and 'agreed identification'. For both settings, we provide protocols for cheater-identifiable secret sharing. In our protocols, the security parameter can be set independently of the share size and the underlying finite field size.
AB - For conventional secret sharing, if cheaters can submit possibly forged shares after observing shares of the honest users in the reconstruction phase, they can disturb the protocol and only they can reconstruct the true secret. To overcome the problem, secret sharing scheme with properties of cheater-identification have been proposed. Existing protocols for cheater-identifiable secret sharing assumed non-rushing cheaters or honest majority. In this paper, using message authentication, we remove both conditions simultaneously, and give its universal construction from any secret sharing scheme. To resolve this end, we explicitly propose the concepts of 'individual identification' and 'agreed identification'. For both settings, we provide protocols for cheater-identifiable secret sharing. In our protocols, the security parameter can be set independently of the share size and the underlying finite field size.
KW - Cheater-identification
KW - Message authentication
KW - Rushing cheater
KW - Secret sharing
KW - Universal construction
KW - Without honest majority
UR - http://www.scopus.com/inward/record.url?scp=85052486618&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85052486618&partnerID=8YFLogxK
U2 - 10.1109/ISIT.2018.8437751
DO - 10.1109/ISIT.2018.8437751
M3 - Conference contribution
AN - SCOPUS:85052486618
SN - 9781538647806
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 2614
EP - 2618
BT - 2018 IEEE International Symposium on Information Theory, ISIT 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2018 IEEE International Symposium on Information Theory, ISIT 2018
Y2 - 17 June 2018 through 22 June 2018
ER -