Please use this identifier to cite or link to this item:
https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1738
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | De, Sourya Joyee | |
dc.contributor.author | Ruj, Sushmita | |
dc.contributor.author | Pal, Asim Kumar | |
dc.date.accessioned | 2021-08-26T06:23:48Z | - |
dc.date.available | 2021-08-26T06:23:48Z | - |
dc.date.issued | 2014 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84911364633&doi=10.1007%2f978-3-319-12280-9_16&partnerID=40&md5=7ec44b5ec9e79156e88b2e1e11e605d7 | |
dc.identifier.uri | https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1738 | - |
dc.description | De, Sourya Joyee, Management Information Systems Group, Indian Institute of Management Calcutta, India; Ruj, Sushmita, R.C. Bose Center for Cryptology and Security, Indian Statistical Institute, Kolkata, India; Pal, Asim Kumar, Management Information Systems Group, Indian Institute of Management Calcutta, India | |
dc.description | ISSN/ISBN - 03029743 | |
dc.description | pp.240-255 | |
dc.description | DOI - 10.1007/978-3-319-12280-9_16 | |
dc.description.abstract | Parties in a rational secret sharing protocol may use mobile devices which are severely resource-constrained. Therefore, it may be in the interest of such parties to try to obtain the secret while spending as little as possible on communication and computation. This preference is different from a traditional rational player and is similar to freeriding. We call such players ‘silent’. The traditional rational player is represented as a ‘non-silent’ player and we modify its preference to incorporate the fact that 1) it is indifferent between incurring a cost and not incurring a cost when everybody is able to reconstruct the secret and 2) it prefers that nobody obtains the secret over some players obtaining the secret free-of-cost while others incur a cost in reconstructing the secret. We thus introduce a mixed-utility model consisting of the utility of obtaining the secret and the cost of computation in order to obtain the secret. We propose new rational secret reconstruction protocols in the simultaneous channel model for both online and offline dealer scenario, that satisfy a new notion of fairness which we call cost-aware complete fairness, in the presence of both silent and non-silent players. Our protocol with the offline dealer makes use of a simplified version of the Boneh-Gentry-Waters [21] broadcast encryption scheme. Both types of parties find it to be in (Bayesian) computational Nash Equilibrium to follow our protocols and the protocols are ([~|] — 1) resilient for non-silent players. © Springer International Publishing Switzerland 2014. | |
dc.publisher | SCOPUS | |
dc.publisher | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.publisher | Springer Verlag | |
dc.relation.ispartofseries | 8813 | |
dc.subject | Secret Sharing | |
dc.subject | Sequential Equilibrium | |
dc.subject | Secure Computation | |
dc.title | Should silence be heard? Fair rational secret sharing with silent and non-silent players | |
dc.type | Conference Paper | |
Appears in Collections: | Management Information Systems |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.