Achieving Correctness in Fair Rational Secret Sharing
Sourya Joyee De & Asim K Pal sjoyeede@gmail.com,asim@iimcal.ac.in
Indian Institute of Management Calcutta
Achieving Correctness in Fair Rational Secret Sharing Sourya Joyee - - PowerPoint PPT Presentation
Achieving Correctness in Fair Rational Secret Sharing Sourya Joyee De & Asim K Pal sjoyeede@gmail.com,asim@iimcal.ac.in Indian Institute of Management Calcutta 12th International Conference on Cryptology and Network Security November 20,
Indian Institute of Management Calcutta
RSS Protocols Special Pref- erences Channel Type Utility-independence Halpern & Teague (’04) Simultaneous broadcast No Gordon & Katz (’06) Simultaneous broadcast No Kol & Naor (’08) UTT > UNF Non-simultaneous broad- cast No Asharov & Lindell (’10) UNF ≥ UTT Non-simultaneous broad- cast UNF dependent; proved im- possibility of UNF indepen- dence for (2, 2) case. Fuchsbauer et al. (’10) UTT > UNF Non-simultaneous, point- to-point, synchronous No Lysyanskaya & Se- gal (’10) UTT > UNF Non-simultaneous, point- to-point, synchronous No Proposed protocol UNF ≥ UTT Non-simultaneous broad- cast UNF independence
◮ Each party broadcasts his share. ◮ If at least t shares are obtained the secret can be reconstructed. ◮ t − 1 shares cannot give the secret.
P1’s outcome P2’s outcome P1’s Utility P2’s Utility (o1) (o2) U1(o1, o2) U2(o1, o2)
UTT
1
(U1) UTT
2
(U2)
UNN
1
(U−
1 )
UNN
2
(U−
2 )
UTN
1
(U+
1 )
UNT
2
(U−−
2
)
UNT
1
(U−−
1
) UTN
2
(U+
2 )
UNF
1
(Uf
1 )
UFN
2
UFN
1
UNF
2
(Uf
2 )
i
i
i
i
i
i
i
i
i
i
i
i
′
i followed by
′
i , σ−i)) = s] ≤ Pr[o−i(Γ, (σ
′
i , σ−i)) = s] + µ(k)
′
i followed by party Pi,
′
i , σ−i)) ̸∈ {s, ⊥}] ≤ µ(k)
◮ It addresses both preference R1 and R2. ◮ It is fair and correct in the non-simultaneous channel model. ◮ It is independent of the utility of misleading i.e. UNF. ◮ It is in computational strict Nash equilibrium in the presence of protocol-
q,i provided by the protocol π to its
′
r from r
′ < r shares, we can write the
′
1x + a
′
2x2 + . . . + a′ r ′−1xr
′−1
◮ randomly chooses one of the r + 1 shares as the checking share; ◮ generates sub-shares of each of the remaining r shares ◮ generates shares of d fake secrets where d is also chosen from a
′
i , Fi ← Gen(1k), i = 1, . . . , r.
′
i ← (ci, K
′
i ).
′
i , i = 1, . . . , r, generate sub-shares c
′
i,j
′
i = c
′
i,1 ⊕ c
′
i,2.
′
i,j (for i = r + 1, . . . , r + d and j = 1, 2), d
′
1,j, . . . , c
′
r+d,j for player Pj
′
i from c
′
i,1 and c
′
i,2.
′
i as (ci, K
′
i ).
′
i ) and find sharei = DecKi(ci).