Repository logo
 

Rational Secret Sharing with and without Synchronous Broadcast, Conspicuous Secrets, Malicious Players and Unbounded Opponents

dc.contributor.authorGidney, Craig
dc.contributor.copyright-releaseNot Applicableen_US
dc.contributor.degreeMaster of Computer Scienceen_US
dc.contributor.departmentFaculty of Computer Scienceen_US
dc.contributor.ethics-approvalNot Applicableen_US
dc.contributor.external-examinerRichard Nowakowskien_US
dc.contributor.graduate-coordinatorQigang Gaoen_US
dc.contributor.manuscriptsNot Applicableen_US
dc.contributor.thesis-readerNorbert Zehen_US
dc.contributor.thesis-supervisorMichael McAllisteren_US
dc.date.accessioned2012-04-13T16:53:20Z
dc.date.available2012-04-13T16:53:20Z
dc.date.defence2012-03-22
dc.date.issued2012-04-13
dc.description.abstractIn secret sharing we are asked to split a secret into several shares in such a way that a minimum number of shares is necessary and sufficient to reconstruct the secret. Rational secret sharing considers secret sharing in the context of adversarial players who want to learn the secret but, secondarily, want to prevent other players from learning the secret. We present protocols, and bounds on the effectiveness of any protocol, for recombining secret shares in the presence of players who do not want others to learn the secret (rationality), may not want to learn the secret themselves (maliciousness), may be colluding, may have unbounded computational capacity, may be able to synchronize sends (asynchronous/synchronous broadcast), and/or may be able to recognize the secret independently (conspicuousness). We propose four protocols and analyze their security against players and coalitions who are each rational or malicious. We also prove three results that show protocols using only asynchronous broadcast are less secure than what can be achieved by protocols using synchronous broadcast.en_US
dc.identifier.urihttp://hdl.handle.net/10222/14647
dc.language.isoenen_US
dc.subjectRational Secret Sharingen_US
dc.titleRational Secret Sharing with and without Synchronous Broadcast, Conspicuous Secrets, Malicious Players and Unbounded Opponentsen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Gidney_Craig_MCS_CS_April_2012_rev2.pdf
Size:
398.09 KB
Format:
Adobe Portable Document Format
Description:
MCS Thesis, revised 2, PDF/a Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.69 KB
Format:
Item-specific license agreed upon to submission
Description: