Skip to main content
Erschienen in: Distributed Computing 3/2015

01.06.2015

Scalable mechanisms for rational secret sharing

verfasst von: Varsha Dani, Mahnush Movahedi, Jared Saia

Erschienen in: Distributed Computing | Ausgabe 3/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We consider the classical secret sharing problem in the case where all agents are rational. In recent work, Kol and Naor show that, when there are two players, in the non-simultaneous communication model, i.e., when rushing is possible, there is no Nash equilibrium that ensures both players learn the secret. However, they describe a mechanism for this problem, for any number of players, that is an \(\epsilon \) -Nash equilibrium, in that no player can gain more than \(\epsilon \) utility by deviating from it. Unfortunately, the Kol and Naor mechanism, and, to the best of our knowledge, all previous mechanisms for this problem require each agent to send \(O(n)\) messages in expectation, where \(n\) is the number of agents. We address this issue by describing mechanisms for rational secret sharing that are designed for large \(n \ge 3\). Our first result is a non-cryptographic mechanism for \(n\)-out-of-\(n\) rational secret sharing that is Nash equilibrium, rather than just \(\epsilon \)-Nash equilibrium. Our second result is a cryptographic mechanism for rational \(t\)-out-of-\(n\) secret sharing that is everlasting \(\epsilon \)-Nash equilibrium. Both our mechanisms are scalable in the sense that they requires each player to send only an expected \(O(\log n)\) bits. Furthermore, the latency of these mechanisms is \(O(\log n)\) in expectation, compared to \(O(n)\) expected latency for the Kol and Naor result. Both of our mechanisms are not susceptible to backwards induction.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Technically, we can achieve scalable (polylog) communication even if we allow \(\mathcal {U}\) to be as big as \({{\mathrm{polylog}}}(n)\).
 
2
Note that the above numbered properties for odd and even labeled nodes in the tree are also correct for short and long players in the definitive round.
 
3
This is why player \(j\) does not try to fake the mask \(m_{r+1}\) - a successfully transmitted incorrect \(m_{r+1}\) will wreak havoc in the next round, since some players will be talking to the wrong players.
 
4
The upper bound of \(O(n)\) on the field size came from the desire to keep \(4\log q\), which is the size of an individual message, small.
 
Literatur
1.
Zurück zum Zitat Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: Proceedings of the 25th Annual ACM Symposium on Principles of Distributed Computing, pp. 53–62. ACM, New York (2006) Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: Proceedings of the 25th Annual ACM Symposium on Principles of Distributed Computing, pp. 53–62. ACM, New York (2006)
3.
Zurück zum Zitat Dani, V., Movahedi, M., Rodriguez, Y., Saia, J.: Scalable rational secret sharing. In: Proceedings of the 13th Annual ACM Symposium on Principles of Distributed Computing. ACM, New York (2011) Dani, V., Movahedi, M., Rodriguez, Y., Saia, J.: Scalable rational secret sharing. In: Proceedings of the 13th Annual ACM Symposium on Principles of Distributed Computing. ACM, New York (2011)
5.
Zurück zum Zitat Geambasu, R., Kohno, T., Levy, A., Levy, H.: Vanish: Increasing data privacy with self-destructing data. In: Proceedings of the 18th Conference on USENIX Security Symposium, pp. 299–316. USENIX Association, Berkeley (2009) Geambasu, R., Kohno, T., Levy, A., Levy, H.: Vanish: Increasing data privacy with self-destructing data. In: Proceedings of the 18th Conference on USENIX Security Symposium, pp. 299–316. USENIX Association, Berkeley (2009)
6.
Zurück zum Zitat Gordon, S., Katz, J.: Rational secret sharing, revisited. Security and Cryptography for Networks pp. 229–241 (2006) Gordon, S., Katz, J.: Rational secret sharing, revisited. Security and Cryptography for Networks pp. 229–241 (2006)
7.
Zurück zum Zitat Halpern, J., Teague, V.: Rational secret sharing and multiparty computation: extended abstract. In: Proceedings of the 36th Annual ACM Symposium on Theory of Computing, p. 632. ACM, New York (2004) Halpern, J., Teague, V.: Rational secret sharing and multiparty computation: extended abstract. In: Proceedings of the 36th Annual ACM Symposium on Theory of Computing, p. 632. ACM, New York (2004)
8.
Zurück zum Zitat King, V., Saia, J.: Breaking the O(\(n^2\)) bit barrier: scalable byzantine agreement with an adaptive adversary. In: Proceeding of the 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, pp. 420–429. ACM, New York (2010) King, V., Saia, J.: Breaking the O(\(n^2\)) bit barrier: scalable byzantine agreement with an adaptive adversary. In: Proceeding of the 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, pp. 420–429. ACM, New York (2010)
9.
Zurück zum Zitat Knuth, D.E.: The Art of Computer Programming, Volume 2 (3rd Ed.): Seminumerical Algorithms. Addison-Wesley Longman Publishing Co., Inc, Boston, MA (1997) Knuth, D.E.: The Art of Computer Programming, Volume 2 (3rd Ed.): Seminumerical Algorithms. Addison-Wesley Longman Publishing Co., Inc, Boston, MA (1997)
10.
Zurück zum Zitat Kol, G., Naor, M.: Games for exchanging information. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, pp. 423–432. ACM, New York (2008) Kol, G., Naor, M.: Games for exchanging information. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, pp. 423–432. ACM, New York (2008)
11.
Zurück zum Zitat Lysyanskaya, A., Triandopoulos, N.: Rationality and adversarial behavior in multi-party computation. Adv. Cryptol. CRYPTO 2006, 180–197 (2006)MathSciNet Lysyanskaya, A., Triandopoulos, N.: Rationality and adversarial behavior in multi-party computation. Adv. Cryptol. CRYPTO 2006, 180–197 (2006)MathSciNet
12.
Zurück zum Zitat Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: Proceedings of the 21st Annual ACM Symposium on Theory of Computing, pp. 73–85. ACM, New york (1989) Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: Proceedings of the 21st Annual ACM Symposium on Theory of Computing, pp. 73–85. ACM, New york (1989)
14.
Zurück zum Zitat Wegman, M., Carter, J.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22(3), 265–279 (1981)CrossRefMATHMathSciNet Wegman, M., Carter, J.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22(3), 265–279 (1981)CrossRefMATHMathSciNet
Metadaten
Titel
Scalable mechanisms for rational secret sharing
verfasst von
Varsha Dani
Mahnush Movahedi
Jared Saia
Publikationsdatum
01.06.2015
Verlag
Springer Berlin Heidelberg
Erschienen in
Distributed Computing / Ausgabe 3/2015
Print ISSN: 0178-2770
Elektronische ISSN: 1432-0452
DOI
https://doi.org/10.1007/s00446-014-0233-4

Premium Partner