Presentation 2009-12-01
Developments of Information-Spectrum Methods and Their Applications to a Secret Sharing Scheme
Hiroki KOGA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In this paper, we discuss coding theorems on a (2, 2)-threshold scheme in the presence of an opponent who impersonates one of the two participants. In the (2, 2)-threshold scheme an encoder generates two shares X_n and Y_n from n outputs S^n from a general source and a uniform random number E_n. The shares X_n and Y_n are securely distributed to participants 1 and 2, respectively. Since we consider an opponent who tries to impersonate one of participants 1 and 2, the input to a decoder can be (X_, Y_n), (X^^-_n, Y_n) and (X_n, Y^^-_n), where X^^-_n and Y^^-_n are flatulent shares generated by the opponent. The decoder judges whether the input is legitimate or not. If the input is judged as legitimate, the decoder decodes S^n with negligible decoding error probability. We give three versions of coding theorems with respect to the rates of X_n, Y_n and E_n and the exponent of the probability of the successful impersonation attack. We show that information-spectrum methods provide useful notions for describing correlation of the two shares X_n and Y_n, which is essential in evaluations of the success probability of the impersonation attack.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Secret sharing scheme / (2, 2)-threshold scheme / impersonation attack / coding theorem / information-spectrum / general source
Paper # IT2009-47
Date of Issue

Conference Information
Committee IT
Conference Date 2009/11/24(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Theory (IT)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Developments of Information-Spectrum Methods and Their Applications to a Secret Sharing Scheme
Sub Title (in English)
Keyword(1) Secret sharing scheme
Keyword(2) (2, 2)-threshold scheme
Keyword(3) impersonation attack
Keyword(4) coding theorem
Keyword(5) information-spectrum
Keyword(6) general source
1st Author's Name Hiroki KOGA
1st Author's Affiliation Graduate School of Systems and Information Engineering, University of Tsukuba()
Date 2009-12-01
Paper # IT2009-47
Volume (vol) vol.109
Number (no) 314
Page pp.pp.-
#Pages 8
Date of Issue