Coding Theorems for a (2,2)-Threshold Scheme with Detectability of Impersonation Attacks

Computer Science – Information Theory

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

25 pages, 3 figures. Submitted to IEEE Trans. Inf. Theory

Scientific paper

In this paper, we discuss coding theorems on a $(2, 2)$--threshold scheme in the presence of an opponent who impersonates one of the two shareholders in an asymptotic setup. We consider a situation where $n$ secrets $S^n$ from a memoryless source is blockwisely encoded to two shares and the two shares are decoded to $S^n$ with permitting negligible decoding error. We introduce correlation level of the two shares and characterize the minimum attainable rates of the shares and a uniform random number for realizing a $(2, 2)$--threshold scheme that is secure against the impersonation attack by an opponent. It is shown that, if the correlation level between the two shares equals to an $\ell \ge 0$, the minimum attainable rates coincide with $H(S)+\ell$, where $H(S)$ denotes the entropy of the source, and the maximum attainable exponent of the success probability of the impersonation attack equals to $\ell$. We also give a simple construction of an encoder and a decoder using an ordinary $(2,2)$--threshold scheme where the two shares are correlated and attains all the bounds.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Coding Theorems for a (2,2)-Threshold Scheme with Detectability of Impersonation Attacks does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Coding Theorems for a (2,2)-Threshold Scheme with Detectability of Impersonation Attacks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Coding Theorems for a (2,2)-Threshold Scheme with Detectability of Impersonation Attacks will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-32397

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.