Please use this identifier to cite or link to this item: https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1738
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDe, Sourya Joyee
dc.contributor.authorRuj, Sushmita
dc.contributor.authorPal, Asim Kumar
dc.date.accessioned2021-08-26T06:23:48Z-
dc.date.available2021-08-26T06:23:48Z-
dc.date.issued2014
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84911364633&doi=10.1007%2f978-3-319-12280-9_16&partnerID=40&md5=7ec44b5ec9e79156e88b2e1e11e605d7
dc.identifier.urihttps://ir.iimcal.ac.in:8443/jspui/handle/123456789/1738-
dc.descriptionDe, Sourya Joyee, Management Information Systems Group, Indian Institute of Management Calcutta, India; Ruj, Sushmita, R.C. Bose Center for Cryptology and Security, Indian Statistical Institute, Kolkata, India; Pal, Asim Kumar, Management Information Systems Group, Indian Institute of Management Calcutta, India
dc.descriptionISSN/ISBN - 03029743
dc.descriptionpp.240-255
dc.descriptionDOI - 10.1007/978-3-319-12280-9_16
dc.description.abstractParties in a rational secret sharing protocol may use mobile devices which are severely resource-constrained. Therefore, it may be in the interest of such parties to try to obtain the secret while spending as little as possible on communication and computation. This preference is different from a traditional rational player and is similar to freeriding. We call such players ‘silent’. The traditional rational player is represented as a ‘non-silent’ player and we modify its preference to incorporate the fact that 1) it is indifferent between incurring a cost and not incurring a cost when everybody is able to reconstruct the secret and 2) it prefers that nobody obtains the secret over some players obtaining the secret free-of-cost while others incur a cost in reconstructing the secret. We thus introduce a mixed-utility model consisting of the utility of obtaining the secret and the cost of computation in order to obtain the secret. We propose new rational secret reconstruction protocols in the simultaneous channel model for both online and offline dealer scenario, that satisfy a new notion of fairness which we call cost-aware complete fairness, in the presence of both silent and non-silent players. Our protocol with the offline dealer makes use of a simplified version of the Boneh-Gentry-Waters [21] broadcast encryption scheme. Both types of parties find it to be in (Bayesian) computational Nash Equilibrium to follow our protocols and the protocols are ([~|] — 1) resilient for non-silent players. © Springer International Publishing Switzerland 2014.
dc.publisherSCOPUS
dc.publisherLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.publisherSpringer Verlag
dc.relation.ispartofseries8813
dc.subjectSecret Sharing
dc.subjectSequential Equilibrium
dc.subjectSecure Computation
dc.titleShould silence be heard? Fair rational secret sharing with silent and non-silent players
dc.typeConference Paper
Appears in Collections:Management Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.