Rational Secret Sharing Over an Asynchronous Broadcast Channel With Information Theoretic Security

We consider the problem of rational secret sharing introduced by Halpern and Teague, where the players involved in secret sharing play only if it is to their advantage. This can be characterized in the form of preferences. Players would prefer to get the secret than to not get it and secondly with l...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Journal of Network Security & Its Applications 2011-11, Vol.3 (6), p.1-18
Hauptverfasser: Moses Jr, William K, Pandu Rangan, C
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:We consider the problem of rational secret sharing introduced by Halpern and Teague, where the players involved in secret sharing play only if it is to their advantage. This can be characterized in the form of preferences. Players would prefer to get the secret than to not get it and secondly with lesser preference, they would like as few other players to get the secret as possible. Several positive results have already been published to efficiently solve the problem of rational secret sharing but only a handful of papers have touched upon the use of an asynchronous broadcast channel. used cryptographic primitives, used an interactive dealer, and used an honest minority of players in order to handle an asynchronous broadcast channel. In our paper, we propose an m-out-of-n rational secret sharing scheme which can function over an asynchronous broadcast channel without the use of cryptographic primitives and with a non-interactive dealer. This is possible because our scheme uses a small number, k+1, of honest players. The protocol is resilient to coalitions of size up to k and furthermore it is epsilon -resilient to coalitions of size up to and including m-1. The protocol will have a strict Nash equilibrium with probability ... and an epsilon -Nash equilibrium with probability ... Furthermore, our protocol is immune to backward induction. Later on in the paper, we extend our results to include malicious players as well. We also show that our protocol handles the possibility of a player deviating in order to force another player to get a wrong value in what we believe to be a more time efficient manner than was done in Asharov and Lindell.
ISSN:0975-2307
0974-9330
DOI:10.5121/ijnsa.2011.3601