https://hal.inria.fr/hal-00959007Pieprzyk, JosefJosefPieprzykACAC - Centre for Advanced Computing - Algorithms and Cryptography - Macquarie UniversityZhang, Xian-MoXian-MoZhangACAC - Centre for Advanced Computing - Algorithms and Cryptography - Macquarie UniversityOn Cheating Immune Secret SharingHAL CCSD2004Secret SharingCheating PreventionCheating Immune[INFO.INFO-DM] Computer Science [cs]/Discrete Mathematics [cs.DM]Inria Sophia Antipolis-Méditerranée / I3s, Service Ist2014-03-13 17:05:412017-11-29 10:26:242014-03-13 21:14:02enJournal articleshttps://hal.inria.fr/hal-00959007/document10.46298/dmtcs.321application/pdf1The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong boolean functions. In particular, we prove that for given secret sharing, the average cheating probability over all cheating vectors and all original vectors, i.e., 1/n 2^n ∑ _c=1...n ∑ _α ∈V n ρ _c,α , denoted by øverlineρ , satisfies øverlineρ ≥ \frac12 , and the equality holds if and only if ρ _c,α satisfies ρ _c,α = \frac12 for every cheating vector δ _c and every original vector α . In this case the secret sharing is said to be cheating immune. We further establish a relationship between cheating-immune secret sharing and cryptographic criteria of boolean functions.This enables us to construct cheating-immune secret sharing.