Reconstruction methodology for rational secret sharing based on mechanism design

This is a preview of subscription content, access via your institution.


  1. 1

    Halpern J, Teague V. Rational secret sharing and multiparty computation: extended abstract. In: Proceedings of the 36th Annual ACM Symposium on Theory of Computing, Chicago, 2004. 623–632

    Google Scholar 

  2. 2

    Osborn M J, Rubinstein A. A Course in Game Theory. Cambridge: MIT Press, 1994

    Google Scholar 

  3. 3

    Shamir A. How to share a secret. Commun ACM, 1979, 22: 612–613

    MathSciNet  Article  MATH  Google Scholar 

  4. 4

    Asharov G, Lindell Y. Utility dependence in correct and fair rational secret sharing. J Cryptol, 2011, 24: 157–202

    MathSciNet  Article  MATH  Google Scholar 

  5. 5

    Ong S J, Parkes D C, Rosen A, et al. Fairness with an honest minority and a rational majority. In: Proceedings of the 6th Theory of Cryptography Conference, San Francisco, 2009. 36–53

    Google Scholar 

  6. 6

    Sourya J D, Asim K P. Achieving correctness in fair rational secret sharing. In: Proceedings of the 12th International Conference on Cryptology and Network Security, Paraty, 2013. 139–161

    Google Scholar 

  7. 7

    Nisan N, Ronen A. Algorithmic mechanism design. Games Econ Behavior, 2001, 35: 166–196

    MathSciNet  Article  MATH  Google Scholar 

  8. 8

    Fuchsbauer G, Katz J, Naccache D. Efficient secret sharing in the standard communication model. In: Proceedings of the 7th Theory of Cryptography Conference, Zurich, 2010. 419–436

    Google Scholar 

  9. 9

    Asmuth C, Bloom J. A modular approach to key safeguarding. IEEE Trans Inf Theory, 1983, 29: 208–210

    MathSciNet  Article  Google Scholar 

Download references


This work was supported by National Natural Science Foundation of China (Grant Nos. 61372075, U1405255, 61602360).

Author information



Corresponding author

Correspondence to Xinghua Li.

Additional information

The authors declare that they have no conflict of interest.

Supporting information Universality analysis of the proposed reference model. The supporting information is available online at and link. The supporting materials are published as submitted, without typesetting or editing. The responsibility for scientific accuracy and content remains entirely with the authors.

Electronic supplementary material

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Liu, H., Li, X., Ma, J. et al. Reconstruction methodology for rational secret sharing based on mechanism design. Sci. China Inf. Sci. 60, 088101 (2017).

Download citation