Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Reconstruction methodology for rational secret sharing based on mechanism design

  • Highlight
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Halpern J, Teague V. Rational secret sharing and multiparty computation: extended abstract. In: Proceedings of the 36th Annual ACM Symposium on Theory of Computing, Chicago, 2004. 623–632

    MATH  Google Scholar 

  2. Osborn M J, Rubinstein A. A Course in Game Theory. Cambridge: MIT Press, 1994

    Google Scholar 

  3. Shamir A. How to share a secret. Commun ACM, 1979, 22: 612–613

    Article  MathSciNet  MATH  Google Scholar 

  4. Asharov G, Lindell Y. Utility dependence in correct and fair rational secret sharing. J Cryptol, 2011, 24: 157–202

    Article  MathSciNet  MATH  Google Scholar 

  5. Ong S J, Parkes D C, Rosen A, et al. Fairness with an honest minority and a rational majority. In: Proceedings of the 6th Theory of Cryptography Conference, San Francisco, 2009. 36–53

    MATH  Google Scholar 

  6. Sourya J D, Asim K P. Achieving correctness in fair rational secret sharing. In: Proceedings of the 12th International Conference on Cryptology and Network Security, Paraty, 2013. 139–161

    Google Scholar 

  7. Nisan N, Ronen A. Algorithmic mechanism design. Games Econ Behavior, 2001, 35: 166–196

    Article  MathSciNet  MATH  Google Scholar 

  8. Fuchsbauer G, Katz J, Naccache D. Efficient secret sharing in the standard communication model. In: Proceedings of the 7th Theory of Cryptography Conference, Zurich, 2010. 419–436

    MATH  Google Scholar 

  9. Asmuth C, Bloom J. A modular approach to key safeguarding. IEEE Trans Inf Theory, 1983, 29: 208–210

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61372075, U1405255, 61602360).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinghua Li.

Additional information

The authors declare that they have no conflict of interest.

Supporting information Universality analysis of the proposed reference model. The supporting information is available online at info.scichina.com and link. springer.com. The supporting materials are published as submitted, without typesetting or editing. The responsibility for scientific accuracy and content remains entirely with the authors.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, H., Li, X., Ma, J. et al. Reconstruction methodology for rational secret sharing based on mechanism design. Sci. China Inf. Sci. 60, 088101 (2017). https://doi.org/10.1007/s11432-015-9066-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-015-9066-9

Navigation