Rational Secret Sharing with and without Synchronous Broadcast, Conspicuous Secrets, Malicious Players and Unbounded Opponents
dc.contributor.author | Gidney, Craig | |
dc.contributor.copyright-release | Not Applicable | en_US |
dc.contributor.degree | Master of Computer Science | en_US |
dc.contributor.department | Faculty of Computer Science | en_US |
dc.contributor.ethics-approval | Not Applicable | en_US |
dc.contributor.external-examiner | Richard Nowakowski | en_US |
dc.contributor.graduate-coordinator | Qigang Gao | en_US |
dc.contributor.manuscripts | Not Applicable | en_US |
dc.contributor.thesis-reader | Norbert Zeh | en_US |
dc.contributor.thesis-supervisor | Michael McAllister | en_US |
dc.date.accessioned | 2012-04-13T16:53:20Z | |
dc.date.available | 2012-04-13T16:53:20Z | |
dc.date.defence | 2012-03-22 | |
dc.date.issued | 2012-04-13 | |
dc.description.abstract | In secret sharing we are asked to split a secret into several shares in such a way that a minimum number of shares is necessary and sufficient to reconstruct the secret. Rational secret sharing considers secret sharing in the context of adversarial players who want to learn the secret but, secondarily, want to prevent other players from learning the secret. We present protocols, and bounds on the effectiveness of any protocol, for recombining secret shares in the presence of players who do not want others to learn the secret (rationality), may not want to learn the secret themselves (maliciousness), may be colluding, may have unbounded computational capacity, may be able to synchronize sends (asynchronous/synchronous broadcast), and/or may be able to recognize the secret independently (conspicuousness). We propose four protocols and analyze their security against players and coalitions who are each rational or malicious. We also prove three results that show protocols using only asynchronous broadcast are less secure than what can be achieved by protocols using synchronous broadcast. | en_US |
dc.identifier.uri | http://hdl.handle.net/10222/14647 | |
dc.language.iso | en | en_US |
dc.subject | Rational Secret Sharing | en_US |
dc.title | Rational Secret Sharing with and without Synchronous Broadcast, Conspicuous Secrets, Malicious Players and Unbounded Opponents | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Gidney_Craig_MCS_CS_April_2012_rev2.pdf
- Size:
- 398.09 KB
- Format:
- Adobe Portable Document Format
- Description:
- MCS Thesis, revised 2, PDF/a Format
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.69 KB
- Format:
- Item-specific license agreed upon to submission
- Description: