The Capacity Region of Distributed Multi-User Secret Sharing

03/02/2021
by   Ali Khalesi, et al.
0

In this paper, we study the problem of distributed multi-user secret sharing, including a trusted master node, N∈ℕ storage nodes, and K users, where each user has access to the contents of a subset of storage nodes. Each user has an independent secret message with certain rate, defined as the size of the message normalized by the size of a storage node. Having access to the secret messages, the trusted master node places encoded shares in the storage nodes, such that (i) each user can recover its own message from the content of the storage nodes that it has access to, (ii) each user cannot gain any information about the message of any other user. We characterize the capacity region of the distributed multi-user secret sharing, defined as the set of all achievable rate tuples, subject to the correctness and privacy constraints. In the achievable scheme, for each user, the master node forms a polynomial with the degree equal to the number of its accessible storage nodes minus one, where the value of this polynomial at certain points are stored as the encoded shares. The message of that user is embedded in some of the coefficients of the polynomial. The remaining coefficients are determined such that the content of each storage node serves as the encoded shares for all users that have access to that storage node.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/13/2018

Distributed Multi-User Secret Sharing

A distributed secret sharing system is considered that consists of a dea...
research
01/02/2022

Secure Determinant Codes for Distributed Storage Systems

The information-theoretic secure exact-repair regenerating codes for dis...
research
02/26/2021

PASSAT: Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency

In this paper, we introduce PASSAT, a practical system to boost the secu...
research
01/22/2021

Short Secret Sharing Using Repeatable Random Sequence Generators

We present a new secret sharing algorithm that provides the storage effi...
research
07/25/2021

Low-bandwidth recovery of linear functions of Reed-Solomon-encoded data

We study the problem of efficiently computing on encoded data. More spec...
research
01/10/2019

INTERPOL: Information Theoretically Verifiable Polynomial Evaluation

We study the problem of verifiable polynomial evaluation in the user-ser...
research
02/08/2021

Distributed Storage Allocations for Optimal Service Rates

Redundant storage maintains the performance of distributed systems under...

Please sign up or login with your details

Forgot password? Click here to reset