Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters

Jyotirmoy Pramanik, Partha Sarathi Roy, Sabyasachi Dutta, Avishek Adhikari, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Various adversarial scenarios have been considered in secret sharing for threshold access structure. However, threshold access structure can not provide efficient solution when participants are classified in different compartments. Of many access structures for which ideal secret sharing schemes can be realized, compartmental access structure is an important one. This paper is targeted to initiate the study of secret sharing schemes for compartmental access structure secure against malicious adversary. This paper presents definitions of cheating detectable, cheater identifiable and robust secret sharing schemes in compartmental access structure and their realization through five different constructions in the information-theoretic setting. Moreover in case of cheater identification and robustness, proposed protocols are secure against rushing adversary who are allowed to submit (possibly forged) shares after observing shares of the honest participants in the reconstruction phase.

Original languageEnglish
Title of host publicationInformation Systems Security - 14th International Conference, ICISS 2018, Proceedings
EditorsVinod Ganapathy, R.K. Shyamasundar, Trent Jaeger
PublisherSpringer Verlag
Pages171-188
Number of pages18
ISBN (Print)9783030051709
DOIs
Publication statusPublished - Jan 1 2018
Event14th International Conference on Information Systems Security, ICISS 2018 - Bangalore, India
Duration: Dec 17 2018Dec 19 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11281 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other14th International Conference on Information Systems Security, ICISS 2018
CountryIndia
CityBangalore
Period12/17/1812/19/18

Fingerprint

Access Structure
Secret Sharing Scheme
Secret Sharing
Efficient Solution
Robustness
Scenarios

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Pramanik, J., Roy, P. S., Dutta, S., Adhikari, A., & Sakurai, K. (2018). Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. In V. Ganapathy, R. K. Shyamasundar, & T. Jaeger (Eds.), Information Systems Security - 14th International Conference, ICISS 2018, Proceedings (pp. 171-188). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11281 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-05171-6_9

Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. / Pramanik, Jyotirmoy; Roy, Partha Sarathi; Dutta, Sabyasachi; Adhikari, Avishek; Sakurai, Kouichi.

Information Systems Security - 14th International Conference, ICISS 2018, Proceedings. ed. / Vinod Ganapathy; R.K. Shyamasundar; Trent Jaeger. Springer Verlag, 2018. p. 171-188 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11281 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pramanik, J, Roy, PS, Dutta, S, Adhikari, A & Sakurai, K 2018, Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. in V Ganapathy, RK Shyamasundar & T Jaeger (eds), Information Systems Security - 14th International Conference, ICISS 2018, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11281 LNCS, Springer Verlag, pp. 171-188, 14th International Conference on Information Systems Security, ICISS 2018, Bangalore, India, 12/17/18. https://doi.org/10.1007/978-3-030-05171-6_9
Pramanik J, Roy PS, Dutta S, Adhikari A, Sakurai K. Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. In Ganapathy V, Shyamasundar RK, Jaeger T, editors, Information Systems Security - 14th International Conference, ICISS 2018, Proceedings. Springer Verlag. 2018. p. 171-188. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-030-05171-6_9
Pramanik, Jyotirmoy ; Roy, Partha Sarathi ; Dutta, Sabyasachi ; Adhikari, Avishek ; Sakurai, Kouichi. / Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. Information Systems Security - 14th International Conference, ICISS 2018, Proceedings. editor / Vinod Ganapathy ; R.K. Shyamasundar ; Trent Jaeger. Springer Verlag, 2018. pp. 171-188 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{ad0735b82a7a45ef9c12506f92ed83b3,
title = "Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters",
abstract = "Various adversarial scenarios have been considered in secret sharing for threshold access structure. However, threshold access structure can not provide efficient solution when participants are classified in different compartments. Of many access structures for which ideal secret sharing schemes can be realized, compartmental access structure is an important one. This paper is targeted to initiate the study of secret sharing schemes for compartmental access structure secure against malicious adversary. This paper presents definitions of cheating detectable, cheater identifiable and robust secret sharing schemes in compartmental access structure and their realization through five different constructions in the information-theoretic setting. Moreover in case of cheater identification and robustness, proposed protocols are secure against rushing adversary who are allowed to submit (possibly forged) shares after observing shares of the honest participants in the reconstruction phase.",
author = "Jyotirmoy Pramanik and Roy, {Partha Sarathi} and Sabyasachi Dutta and Avishek Adhikari and Kouichi Sakurai",
year = "2018",
month = "1",
day = "1",
doi = "10.1007/978-3-030-05171-6_9",
language = "English",
isbn = "9783030051709",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "171--188",
editor = "Vinod Ganapathy and R.K. Shyamasundar and Trent Jaeger",
booktitle = "Information Systems Security - 14th International Conference, ICISS 2018, Proceedings",
address = "Germany",

}

TY - GEN

T1 - Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters

AU - Pramanik, Jyotirmoy

AU - Roy, Partha Sarathi

AU - Dutta, Sabyasachi

AU - Adhikari, Avishek

AU - Sakurai, Kouichi

PY - 2018/1/1

Y1 - 2018/1/1

N2 - Various adversarial scenarios have been considered in secret sharing for threshold access structure. However, threshold access structure can not provide efficient solution when participants are classified in different compartments. Of many access structures for which ideal secret sharing schemes can be realized, compartmental access structure is an important one. This paper is targeted to initiate the study of secret sharing schemes for compartmental access structure secure against malicious adversary. This paper presents definitions of cheating detectable, cheater identifiable and robust secret sharing schemes in compartmental access structure and their realization through five different constructions in the information-theoretic setting. Moreover in case of cheater identification and robustness, proposed protocols are secure against rushing adversary who are allowed to submit (possibly forged) shares after observing shares of the honest participants in the reconstruction phase.

AB - Various adversarial scenarios have been considered in secret sharing for threshold access structure. However, threshold access structure can not provide efficient solution when participants are classified in different compartments. Of many access structures for which ideal secret sharing schemes can be realized, compartmental access structure is an important one. This paper is targeted to initiate the study of secret sharing schemes for compartmental access structure secure against malicious adversary. This paper presents definitions of cheating detectable, cheater identifiable and robust secret sharing schemes in compartmental access structure and their realization through five different constructions in the information-theoretic setting. Moreover in case of cheater identification and robustness, proposed protocols are secure against rushing adversary who are allowed to submit (possibly forged) shares after observing shares of the honest participants in the reconstruction phase.

UR - http://www.scopus.com/inward/record.url?scp=85058986033&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85058986033&partnerID=8YFLogxK

U2 - 10.1007/978-3-030-05171-6_9

DO - 10.1007/978-3-030-05171-6_9

M3 - Conference contribution

AN - SCOPUS:85058986033

SN - 9783030051709

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 171

EP - 188

BT - Information Systems Security - 14th International Conference, ICISS 2018, Proceedings

A2 - Ganapathy, Vinod

A2 - Shyamasundar, R.K.

A2 - Jaeger, Trent

PB - Springer Verlag

ER -