{"title":"用信息论探讨(t, n)阈值秘密共享方案的攻防观点","authors":"Ze Yang, Youliang Tian","doi":"10.1109/NaNA53684.2021.00017","DOIUrl":null,"url":null,"abstract":"At present, the research on shares in the t-out-of-n secret sharing scheme mainly focuses on the delimitation of share length, and there is no specific quantitative method for the security of authorized shares t in secret sharing without considering any application scenarios. In this paper, we presents a method to quantity the capabilities of the attacker and the defender under the t-out-of-n secret sharing scheme. More specifically, we present a new general notion of limitation to provide a precise bound of attack and defense capability under the $(t,\\ n)$-threshold sharing scheme. Furthermore, we discuss the best selection of authorized shares t. Firstly, we transform the attack and defense under the $(t,\\ n)$-threshold secret sharing scheme into the communication problem in information theory, and establish the attack channel and defense channel from the point of view of the attacker and the defender. Moreover, we describe the capability of both attacking and defending by introducing average mutual information, and analyze the limitation of the capability of both sides, as well as the maximum value of the average mutual information is the channel capacity. Finally, according to the average amount of mutual information of the change curve under different scenarios of secret sharing, we compare and analyze the influence of the capability limitation of the attacker and the defender on the value of t, and get the best selection of t.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"30 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Towards Attack and Defense Views to (t, n)-threshold Secret Sharing Scheme Using Information Theory\",\"authors\":\"Ze Yang, Youliang Tian\",\"doi\":\"10.1109/NaNA53684.2021.00017\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"At present, the research on shares in the t-out-of-n secret sharing scheme mainly focuses on the delimitation of share length, and there is no specific quantitative method for the security of authorized shares t in secret sharing without considering any application scenarios. In this paper, we presents a method to quantity the capabilities of the attacker and the defender under the t-out-of-n secret sharing scheme. More specifically, we present a new general notion of limitation to provide a precise bound of attack and defense capability under the $(t,\\\\ n)$-threshold sharing scheme. Furthermore, we discuss the best selection of authorized shares t. Firstly, we transform the attack and defense under the $(t,\\\\ n)$-threshold secret sharing scheme into the communication problem in information theory, and establish the attack channel and defense channel from the point of view of the attacker and the defender. Moreover, we describe the capability of both attacking and defending by introducing average mutual information, and analyze the limitation of the capability of both sides, as well as the maximum value of the average mutual information is the channel capacity. Finally, according to the average amount of mutual information of the change curve under different scenarios of secret sharing, we compare and analyze the influence of the capability limitation of the attacker and the defender on the value of t, and get the best selection of t.\",\"PeriodicalId\":414672,\"journal\":{\"name\":\"2021 International Conference on Networking and Network Applications (NaNA)\",\"volume\":\"30 1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Networking and Network Applications (NaNA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NaNA53684.2021.00017\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Networking and Network Applications (NaNA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NaNA53684.2021.00017","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards Attack and Defense Views to (t, n)-threshold Secret Sharing Scheme Using Information Theory
At present, the research on shares in the t-out-of-n secret sharing scheme mainly focuses on the delimitation of share length, and there is no specific quantitative method for the security of authorized shares t in secret sharing without considering any application scenarios. In this paper, we presents a method to quantity the capabilities of the attacker and the defender under the t-out-of-n secret sharing scheme. More specifically, we present a new general notion of limitation to provide a precise bound of attack and defense capability under the $(t,\ n)$-threshold sharing scheme. Furthermore, we discuss the best selection of authorized shares t. Firstly, we transform the attack and defense under the $(t,\ n)$-threshold secret sharing scheme into the communication problem in information theory, and establish the attack channel and defense channel from the point of view of the attacker and the defender. Moreover, we describe the capability of both attacking and defending by introducing average mutual information, and analyze the limitation of the capability of both sides, as well as the maximum value of the average mutual information is the channel capacity. Finally, according to the average amount of mutual information of the change curve under different scenarios of secret sharing, we compare and analyze the influence of the capability limitation of the attacker and the defender on the value of t, and get the best selection of t.