Hierarchical secret sharing schemes secure against rushing adversary: Cheater identification and robustness

Partha Sarathi Roy, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Threshold access structures of secret sharing schemes capture a scenario in which all the participants have the same weight (or power) and their contributions are equal. However, in some situations such as gradation among officials in an organization, the participants have different weights. Hierarchical access structures capture those natural scenarios, where different levels of hierarchy are present and a participant belongs precisely to one of them. Although an extensive research addressing the issues of cheater identifiability and robustness have been done for threshold secret sharing, no such research has been carried out for hierarchical secret sharing (HSS). This paper resolves this long-standing open issue by presenting definitions and constructions of both cheater identifiable and robust HSS schemes secure against rushing adversary, in the information-theoretic setting.

Original languageEnglish
Title of host publicationInformation Security Practice and Experience - 14th International Conference, ISPEC 2018, Proceedings
EditorsHiroaki Kikuchi, Chunhua Su
PublisherSpringer Verlag
Pages578-594
Number of pages17
ISBN (Print)9783319998060
DOIs
Publication statusPublished - Jan 1 2018
Event14th International Conference on Information Security Practice and Experience, ISPEC 2018 - Tokyo, Japan
Duration: Sep 25 2018Sep 27 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11125 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other14th International Conference on Information Security Practice and Experience, ISPEC 2018
CountryJapan
CityTokyo
Period9/25/189/27/18

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Hierarchical secret sharing schemes secure against rushing adversary: Cheater identification and robustness'. Together they form a unique fingerprint.

  • Cite this

    Roy, P. S., Dutta, S., Morozov, K., Adhikari, A., Fukushima, K., Kiyomoto, S., & Sakurai, K. (2018). Hierarchical secret sharing schemes secure against rushing adversary: Cheater identification and robustness. In H. Kikuchi, & C. Su (Eds.), Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Proceedings (pp. 578-594). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11125 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-99807-7_37