Abstract
This paper presents two new coding theorems on a (2, 2)-threshold scheme with an opponent who impersonates one of the shareholders. In the (2, 2)-threshold scheme an encoder blockwisely generates two shares X n and Y n from n secrets Sn and a uniform random number E n , where Sn is generated from a general source. There are three kinds of inputs to a decoder, (N n ., Y n ), (X n , X n ) and (X n , Y n ), where X n and Y n are fraudulent shares generated by the opponent. The decoder judges whether the input is legitimate or not under negligible decoding error probability that vanishes as n →. The two coding theorems given in this paper characterize the minimum attainable rates of X n , Y n and E n and the maximum attainable exponent of the probability of the successful impersonation attack. It turns out that the (2, 2)-threshold scheme with a cheater is related to not only hypothesis testing but also optimistic coding of general sources and channels.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.