Abstract
We propose cryptographic rational secret sharing protocols over general networks. In a general network, the dealer may not have direct connections to each player, and players may not have direct connections to each of the other players. We present conditions on the network topology for which our proposed protocols are computational strict Nash equilibria and (k−1)-resilient, along with analysis on their round and communication complexity. We also present new notions of equilibria such as Φ-resilient computational Nash equilibria, whereby a protocol is resilient to coalitions that satisfy conditions in Φ, regardless of the coalition’s size. We also propose (n−1)-key leakage-tolerant equilibria applicable to cryptographic protocols involving secret keys, whereby the equilibrium holds even if some players acquire (n−1) tuples of secret keys.
Funder
Department of Science and Technology
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Software
Reference27 articles.
1. How to share a secret;Shamir;Commun. ACM,1979
2. Boneh, D., and Shoup, V. A Graduate Course in Applied Cryptography. 2022.
3. Beimel, A. Secret-sharing schemes: A survey. Proceedings of the International Conference on Coding and Cryptology, 2011.
4. Iwamura, K., and Kamal, A.A.A.M. Secure computation by secret sharing using input encrypted with random number (full paper). Cryptol. ePrint Arch., 2021.
5. Cramer, R., and Damgård, I.B. Secure Multiparty Computation, 2015.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献