IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference 2007
DOI: 10.1109/glocom.2007.16
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Keyless Secret Sharing Over Noiseless Channels

Abstract: In traditional secret sharing, a central trusted authority must divide a secret into multiple parts, called shares, such that the secret can only be recovered when a certain number of shares are available for reconstruction [1], [2]. In this paper, we consider a secret sharing problem in which each share must be created separately by independent entities such that no collaboration or shared cryptographic keys are required; we call this the distributed keyless secret sharing problem. For this problem, general t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
12
0

Year Published

2007
2007
2014
2014

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(13 citation statements)
references
References 6 publications
1
12
0
Order By: Relevance
“…In addition, R(D) = 0 is necessary for unconditional secrecy, and so although allowing non-zero distortion does increase secrecy from the distortionless case (when R(D) = H(S)), it is not for free. Finally Theorem 1 can also be shown to match our previous distortionless result when D = 0 in [16].…”
Section: Capacity Region For Dsssupporting
confidence: 76%
See 3 more Smart Citations
“…In addition, R(D) = 0 is necessary for unconditional secrecy, and so although allowing non-zero distortion does increase secrecy from the distortionless case (when R(D) = H(S)), it is not for free. Finally Theorem 1 can also be shown to match our previous distortionless result when D = 0 in [16].…”
Section: Capacity Region For Dsssupporting
confidence: 76%
“…The main novel contribution in this paper is the analysis of the compression-secrecy tradeoff when the base station is permitted a non-zero distortion reconstruction of the nodes' data; this extends our previous work in which we required perfect reconstruction at the base station [16,17]. The extension involves the application of rate-distortion and multiterminal source coding theory.…”
Section: Contribution Of Papermentioning
confidence: 91%
See 2 more Smart Citations
“…This corollary can be obtained from Theorem 1 by noting the fact that I(X; Y |U ) − I(X; Z|U ) ≤ I(X; Y ) − I(X; Z) in view of the Markov chain in (6), where the equality can be attained by setting U = φ. Corollary 1 implies that in the degraded case, the relative equivocation is not affected by the choice of V , and hence, there is no tension between the achievable rate and the achievable relative equivocation originating from the choice of V . This also implies that the use of optimal compression rate for the given distortion level is optimal.…”
Section: Single-letter Characterizationmentioning
confidence: 99%