The Capacity Region of Distributed Multi-User Secret Sharing Under Perfect Secrecy

被引:0
作者
Wu, Jiahong [1 ]
Liu, Nan [1 ]
Kang, Wei [2 ]
机构
[1] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
[2] Southeast Univ, Sch Informat Sci & Engn, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Decoding; Encoding; Cryptography; Symbols; Periodic structures; Electronic mail; Complexity theory; Vectors; Topology; Sufficient conditions; Secret sharing; distributed storage; multi-user secrecy; linear scheme; capacity region; STORAGE; INFORMATION; PRIVATE;
D O I
10.1109/TIFS.2024.3484666
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the problem of distributed multi-user secret sharing (DMUSS), involving a main node, N storage nodes, and K users. Every user has access to the contents of a certain subset of storage nodes and wants to decode an independent secret message. With knowledge of K secret messages, the main node strategically places encoded shares in the storage nodes, ensuring two crucial conditions: (i) each user can recover its own secret message from the storage nodes that it has access to; (ii) each user is unable to acquire any information regarding the collection of $K-1$ secret messages for all the other users. The rate of each user is defined as the size of its secret message normalized by the size of a storage node. We characterize the capacity region of the DMUSS problem, which is the closure of the set of all achievable rate tuples that satisfy the correctness and perfect secrecy conditions. The converse proof relies on a bound from the traditional single-secret sharing regime. In the achievability proof, we firstly design the linear decoding functions, based on the fact that each secret message needs to be recovered from a single set of storage nodes. It turns out that the perfect secrecy condition holds if K matrices, whose entries are extracted from the decoding functions, are full rank. We prove that the decoding functions can be constructed explicitly if the rate tuple satisfies the converse and the field size is not less than K. At last, the encoding functions are obtained by solving the system of linear decoding functions, where some shares are equal to the randomness and the other shares are linear combinations of the secret messages and the randomness.
引用
收藏
页码:9954 / 9969
页数:16
相关论文
共 53 条
[1]   Secure Coded Multi-Party Computation for Massive Matrix Operations [J].
Akbari-Nodehi, Hanzaleh ;
Maddah-Ali, Mohammad Ali .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (04) :2379-2398
[2]   Private and Secure Distributed Matrix Multiplication With Flexible Communication Load [J].
Aliasgari, Malihe ;
Simeone, Osvaldo ;
Kliewer, Jorg .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :2722-2734
[3]  
Anilkumar Hari Krishnan P., 2023, 2023 IEEE International Symposium on Information Theory (ISIT), P252, DOI 10.1109/ISIT54713.2023.10206455
[4]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[5]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[6]  
Bennett C. H., 1994, Proceedings. 1994 IEEE International Symposium on Information Theory (Cat. No.94CH3467-8), DOI 10.1109/ISIT.1994.394668
[7]   Staircase Codes for Secret Sharing With Optimal Communication and Read Overheads [J].
Bitar, Rawad ;
El Rouayheb, Salim .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (02) :933-943
[8]  
Blakley G.R., 1979, P INT WORKSH MAN REQ, P313, DOI DOI 10.1109/MARK.1979.8817296
[9]  
Blundo C., 1993, STACS 93. 10th Annual Symposium on Theoretical Aspects of Computer Science, P692
[10]  
Blundo C., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P150