Journal on Communications ›› 2021, Vol. 42 ›› Issue (11): 54-65.doi: 10.11959/j.issn.1000-436x.2021195

• Topics: New Technology of Computer Communication and Network System Security • Previous Articles     Next Articles

Design models of secret reconstruction towards rational users

Hai LIU1,2, Youliang TIAN3, Ying TANG4, Jianbing Ni5, Jianfeng MA3   

  1. 1 School of Information, Guizhou University of Finance and Economics, Guiyang 550025, China
    2 Laboratory of Trusted Computing and Information Assurance, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
    3 State Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, China
    4 Office of Development Planning and Academic Development, Guizhou University of Finance and Economics, Guiyang 550025, China
    5 Department of Electrical and Computer Engineering, Queen’s University, Kingston K7L 3N6, Canada
  • Revised:2021-09-28 Online:2021-11-25 Published:2021-11-01
  • Supported by:
    The National Natural Science Foundation of China(62062071);The Science and Technology Program of Guizhou Province([2020]1Y265)

Abstract:

Rational Secret Reconstruction is an intersection between traditional secret reconstruction and game theory, which aims to restrict the selfish behaviors of rational users, making both of them obtain the secret in real applications.However, when directly adopting the existing rational secret reconstruction protocols, it is infeasible to realize the fair secret reconstruction.More seriously, an extreme situation may rise, which is some users regard a fake secret as the real one.The crucial reason is that, due to lack of design models, the protocol designers cannot completely consider their selfish behaviors when rational users participate in secret reconstruction.To solve that problem, through the formalizations of rational users and rational secret reconstruction game, the influences of rational users’ action order and their chosen strategies about the fair secret reconstruction were analyzed, and then, three design models for the different scenarios, including purely user rational scenario, reputation-based scenario and trusted user-based scenario, were proposed respectively.Theoretical analysis demonstrates that, the proposed models can help the designers restrict rational users’ selfishness effectively, thereby guiding the designers to devise the fair rational secret reconstruction protocols.Additionally, under the guidance of the proposed models, a fair rational secret reconstruction protocol was devised, which indicated that the proposed models were usable.

Key words: secret sharing, rational users, fair reconstruction, design models, selfish behaviors

CLC Number: 

No Suggested Reading articles found!