Secret sharing via noisy broadcast channels

We consider the secret sharing problem, in which a dealer distributes a secret among a set of participants in such a manner that only qualified sets of users can recover the secret by pooling their shares together while non-qualified sets of users will obtain no information about the secret even if they pool their shares together. In contrast to the existing solutions that are mainly based on number theoretic tools, we propose a physical layer approach that exploits the presence of random noise inherent to wireless channels for secret sharing. Two different scenarios are considered. In the first scenario, the classic secret sharing problem with a single secret message is considered, in which qualified sets are specified by a general access structure. A secret sharing scheme is proposed by constructing a secure coding scheme for an equivalent compound wiretap channel. Based on this approach, both lower and upper bounds on the secret sharing capacity are obtained. For some special cases, the secret sharing capacity is fully characterized. In the second scenario, a generalization of the classic secret sharing problem is proposed, in which multiple secret messages are required to be recovered at different qualified sets. A secret sharing scheme is provided by constructing an equivalent broadcast channel with compound eavesdroppers and constructing a secure coding scheme for the equivalent channel.

[1]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[2]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[3]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[4]  Rudolf Ahlswede,et al.  Common Randomness in Information Theory and Cryptography - Part II: CR Capacity , 1998, IEEE Trans. Inf. Theory.

[5]  Shlomo Shamai,et al.  Compound Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..

[6]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Alfredo De Santis,et al.  New bounds on the information rate of secret sharing schemes , 1995, IEEE Trans. Inf. Theory.

[9]  Douglas R. Stinson,et al.  An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..

[10]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[11]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[12]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.