93
views
0
recommends
+1 Recommend
0 collections
    8
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Coding Theorems for a (2,2)-Threshold Scheme with Detectability of Impersonation Attacks

      Preprint
      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In this paper, we discuss coding theorems on a \((2, 2)\)--threshold scheme in the presence of an opponent who impersonates one of the two shareholders in an asymptotic setup. We consider a situation where \(n\) secrets \(S^n\) from a memoryless source is blockwisely encoded to two shares and the two shares are decoded to \(S^n\) with permitting negligible decoding error. We introduce correlation level of the two shares and characterize the minimum attainable rates of the shares and a uniform random number for realizing a \((2, 2)\)--threshold scheme that is secure against the impersonation attack by an opponent. It is shown that, if the correlation level between the two shares equals to an \(\ell \ge 0\), the minimum attainable rates coincide with \(H(S)+\ell\), where \(H(S)\) denotes the entropy of the source, and the maximum attainable exponent of the success probability of the impersonation attack equals to \(\ell\). We also give a simple construction of an encoder and a decoder using an ordinary \((2,2)\)--threshold scheme where the two shares are correlated and attains all the bounds.

          Related collections

          Author and article information

          Journal
          2010-04-26
          2012-02-18
          Article
          1004.4530
          2ff6cf75-f275-4f31-a377-9b7ae0f8c4f9

          http://arxiv.org/licenses/nonexclusive-distrib/1.0/

          History
          Custom metadata
          25 pages, 3 figures. Submitted to IEEE Trans. Inf. Theory
          cs.IT cs.CR math.IT

          Numerical methods,Security & Cryptology,Information systems & theory
          Numerical methods, Security & Cryptology, Information systems & theory

          Comments

          Comment on this article