There are often situations where two remote users each have data, and wish to (i) verify the equality of their data, and (ii) whenever a discrepancy is found afterwards, determine which of the two modified his data. The most common example is where they want to authenticate messages they exchange. Another possible example is where they have a huge database and its mirror in remote places, and whenever a discrepancy is found between their data, they can determine which of the two users is to blame. Of course, if one is allowed to use computational assumptions, this function can be realized readily, e.g., by using digital signatures. However, if one needs information-theoretic security, there is no known method that realizes this function efficiently, i.e., with secret key, communication, and trusted third parties all being sufficiently small. In order to realize this function efficiently with information-theoretic security, we here define the ``equality-testing protocol with dispute resolution'' as a new framework. The most significant difference between our protocol and the previous methods with similar functions is that we allow the intervention of a trusted third party when checking the equality of the data. In this new framework, we also present an explicit protocol that is information-theoretically secure and efficient.
翻译:通常存在两个远程用户各自拥有数据的情况,他们希望(一) 核实数据的平等性,以及(二) 在此后发现差异时,确定其中哪一个数据。最常见的例子是他们想要对信件进行交换。另一个可能的例子是,他们有一个巨大的数据库及其在偏远地点的镜子,如果发现数据之间存在差异,他们可以确定这两个用户中的哪一个要负责。当然,如果允许使用计算假设,这一功能可以很容易地实现,例如,使用数字签名。然而,如果需要信息理论安全,则没有已知的方法可以有效地实现这一功能,即,秘密钥匙、通信和信任的第三方都足够小。为了有效地利用信息理论安全实现这一功能,我们在这里将“平等测试协议”和“争议解决”定义为一个新的框架。我们协议和具有类似功能的先前方法之间的最重大区别是,我们允许信任的第三方在检查数据平等性时进行干预。这个新的框架是明确的,我们提出一个明确的协议。