TY - GEN
T1 - Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters
AU - Pramanik, Jyotirmoy
AU - Roy, Partha Sarathi
AU - Dutta, Sabyasachi
AU - Adhikari, Avishek
AU - Sakurai, Kouichi
N1 - Funding Information:
J. Pramanik—Research is supported by Council of Scientific & Industrial Research (CSIR), India (Grant no. 09/028(961)2015-EMR-1). S. Dutta—Research is supported by National Institute of Information and Communications Technology (NICT), Japan under the NICT International Invitation Program.
Publisher Copyright:
© 2018, Springer Nature Switzerland AG.
PY - 2018
Y1 - 2018
N2 - Various adversarial scenarios have been considered in secret sharing for threshold access structure. However, threshold access structure can not provide efficient solution when participants are classified in different compartments. Of many access structures for which ideal secret sharing schemes can be realized, compartmental access structure is an important one. This paper is targeted to initiate the study of secret sharing schemes for compartmental access structure secure against malicious adversary. This paper presents definitions of cheating detectable, cheater identifiable and robust secret sharing schemes in compartmental access structure and their realization through five different constructions in the information-theoretic setting. Moreover in case of cheater identification and robustness, proposed protocols are secure against rushing adversary who are allowed to submit (possibly forged) shares after observing shares of the honest participants in the reconstruction phase.
AB - Various adversarial scenarios have been considered in secret sharing for threshold access structure. However, threshold access structure can not provide efficient solution when participants are classified in different compartments. Of many access structures for which ideal secret sharing schemes can be realized, compartmental access structure is an important one. This paper is targeted to initiate the study of secret sharing schemes for compartmental access structure secure against malicious adversary. This paper presents definitions of cheating detectable, cheater identifiable and robust secret sharing schemes in compartmental access structure and their realization through five different constructions in the information-theoretic setting. Moreover in case of cheater identification and robustness, proposed protocols are secure against rushing adversary who are allowed to submit (possibly forged) shares after observing shares of the honest participants in the reconstruction phase.
UR - http://www.scopus.com/inward/record.url?scp=85058986033&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85058986033&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-05171-6_9
DO - 10.1007/978-3-030-05171-6_9
M3 - Conference contribution
AN - SCOPUS:85058986033
SN - 9783030051709
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 171
EP - 188
BT - Information Systems Security - 14th International Conference, ICISS 2018, Proceedings
A2 - Ganapathy, Vinod
A2 - Shyamasundar, R.K.
A2 - Jaeger, Trent
PB - Springer Verlag
T2 - 14th International Conference on Information Systems Security, ICISS 2018
Y2 - 17 December 2018 through 19 December 2018
ER -