Title :
Two generalizations of a coding theorem for a (2, 2)-threshold scheme with a cheater
Author_Institution :
Grad. Sch. of Syst. & Inf. Eng., Univ. of Tsukuba, Tsukuba, Japan
Abstract :
This paper presents two new coding theorems on a (2, 2)-threshold scheme with an opponent who impersonates one of the shareholders. In the (2, 2)-threshold scheme an encoder blockwisely generates two shares Xn and Yn from n secrets Sn and a uniform random number En, where Sn is generated from a general source. There are three kinds of inputs to a decoder, (Nn., Yn), (X̅n, Xn) and (Xn, Y̅n), where X̅n and Y̅n are fraudulent shares generated by the opponent. The decoder judges whether the input is legitimate or not under negligible decoding error probability that vanishes as n → ∞. The two coding theorems given in this paper characterize the minimum attainable rates of Xn, Yn and En and the maximum attainable exponent of the probability of the successful impersonation attack. It turns out that the (2, 2)-threshold scheme with a cheater is related to not only hypothesis testing but also optimistic coding of general sources and channels.
Keywords :
decoding; encoding; error statistics; coding theorem; decoder; encoder; optimistic coding; threshold scheme; uniform random number; Correlation; Decoding; Encoding; Probability distribution; Random variables; Tin; Zinc;
Conference_Titel :
Information Theory and its Applications (ISITA), 2010 International Symposium on
Conference_Location :
Taichung
Print_ISBN :
978-1-4244-6016-8
Electronic_ISBN :
978-1-4244-6017-5
DOI :
10.1109/ISITA.2010.5649671