Improving Anonymity in Shared Key Primitives Based on Perfect Hash Families

Improving Anonymity in Shared Key Primitives Based on Perfect Hash   Families
Notice: This research summary and analysis were automatically generated using AI technology. For absolute accuracy, please refer to the [Original Paper Viewer] below or the Original ArXiv Source.

We propose a new scheme for sharing symmetric key operations among a set of participants according to a (t,n) threshold access structure. We focus on anonymity properties of this scheme and show that this scheme provides improved values of anonymity measures than the existing ones. In particular, the scheme can provide optimal and equitable participant anonymity when it is based on balanced perfect hash families.


💡 Research Summary

The paper addresses the problem of anonymity in symmetric‑key sharing schemes that are built on a (t, n) threshold access structure. In such schemes a set of n participants is organized so that any t of them can jointly recover at least one secret key, while any smaller set learns nothing. The authors focus on quantifying anonymity both at the group level (which t‑subset actually performed the operation) and at the individual level (whether a particular participant was involved).

Zaverucha and Stinson (2010) introduced a set of anonymity measures: µ = 1 – max Pr


Comments & Academic Discussion

Loading comments...

Leave a Comment