An Information Theoretic Approach to Secret Sharing
From MaRDI portal
Publication:2977413
DOI10.1109/TIT.2015.2421905zbMATH Open1359.94665arXiv1404.6474MaRDI QIDQ2977413FDOQ2977413
Authors: Shaofeng Zou, Yingbin Liang, Lifeng Lai, S. Shamai
Publication date: 28 April 2017
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Abstract: A novel information theoretic approach is proposed to solve the secret sharing problem, in which a dealer distributes one or multiple secrets among a set of participants that for each secret only qualified sets of users can recover it by pooling their shares together while non-qualified sets of users obtain no information about the secret even if they pool their shares together. While existing secret sharing systems (implicitly) assume that communications between the dealer and participants are noiseless, this paper takes a more practical assumption that the dealer delivers shares to the participants via a noisy broadcast channel. An information theoretic approach is proposed, which exploits the channel as additional resources to achieve secret sharing requirements. In this way, secret sharing problems can be reformulated as equivalent secure communication problems via wiretap channels, and can be solved by employing powerful information theoretic security techniques. This approach is first developed for the classic secret sharing problem, in which only one secret is to be shared. This classic problem is shown to be equivalent to a communication problem over a compound wiretap channel. The lower and upper bounds on the secrecy capacity of the compound channel provide the corresponding bounds on the secret sharing rate. The power of the approach is further demonstrated by a more general layered multi-secret sharing problem, which is shown to be equivalent to the degraded broadcast multiple-input multiple-output (MIMO) channel with layered decoding and secrecy constraints. The secrecy capacity region for the degraded MIMO broadcast channel is characterized, which provides the secret sharing capacity region. Furthermore, these secure encoding schemes that achieve the secrecy capacity region provide an information theoretic scheme for sharing the secrets.
Full work available at URL: https://arxiv.org/abs/1404.6474
Cited In (6)
- Information-theoretic secure verifiable secret sharing over RSA modulus
- On the information ratio of non-perfect secret sharing schemes
- On the Combinatorial Approaches of Computing Upper Bounds on the Information Rate of Secret Sharing Schemes
- On the information rate of secret sharing schemes
- Source-location privacy full protection in wireless sensor networks
- Approximate Degree, Secret Sharing, and Concentration Phenomena
This page was built for publication: An Information Theoretic Approach to Secret Sharing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2977413)