Properties and constraints of cheating-immune secret sharing schemes

  • Authors:
  • Paolo D'Arco;Wataru Kishimoto;Douglas R. Stinson

  • Affiliations:
  • Dipartimento di Informatica ed Applicazioni, Università degli Studi di Salerno, Baronissi (SA), Italy and Department of Combinatorics and Optimization, University of Waterloo, Canada;Department of Information & Image Science, Chiba University, Chiba, Japan;School of Computer Science, University of Waterloo, Waterloo, Ont., Canada

  • Venue:
  • Discrete Applied Mathematics - Special issue: Coding and cryptography
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

A secret sharing scheme is a cryptographic protocol by means of which a dealer shares a secret among a set of participants in such a way that it can be subsequently reconstructed by certain qualified subsets. The setting we consider is the following: in a first phase, the dealer gives in a secure way a piece of information, called a share, to each participant. Then, participants belonging to a qualified subset send in a secure way their shares to a trusted party, referred to as a combiner, who computes the secret and sends it back to the participantsCheating-immune secret sharing schemes are secret sharing schemes in the above setting where dishonest participants, during the reconstruction phase, have no advantage in sending incorrect shares to the combiner (i.e., cheating) as compared to honest participants. More precisely, a coalition of dishonest participants, by using their correct shares and the incorrect secret supplied by the combiner, have no better chance in determining the true secret (that would have been reconstructed if they submitted correct shares) than an honest participant.In this paper we study properties and constraints of cheating-immune secret sharing schemes. We show that a perfect secret sharing scheme cannot be cheating-immune. Then, we prove an upper bound on the number of cheaters tolerated in such schemes. We also repair a previously proposed construction to realize cheating-immune secret sharing schemes. Finally, we discuss some open problems.