Skip to main content

On the Isolation of a Common Secret

  • Chapter
  • First Online:
  • 1937 Accesses

Summary

Two parties are said to “share a secret” if there is a question to which only they know the answer. Since possession of a shared secret allows them to communicate a bit between them over an open channel without revealing the value of the bit, shared secrets are fundamental in cryptology.We consider below the problem of when two parties with shared knowledge can use that knowledge to establish, over an open channel, a shared secret. There are no issues of complexity or probability; the parties are not assumed to be limited in computing power, and secrecy is judged only relative to certainty, not probability. In this context the issues become purely combinatorial and in fact lead to some curious results in graph theory.Applications are indicated in the game of bridge, and for a problem involving two sheriffs, eight suspects and a lynch mob.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Zs. Baranyai, On the factorization of the complete uniform hypergraph, Infinite and finite sets (Keszthely, 1973; dedicated to P. Erdős on his 60th birthday), Vol. I (1975) 91–108.

    Google Scholar 

  2. M. Fischer, M. Paterson, and C. Rackoff, Secret bit transmission using a random deal of cards, Distributed Computing and Cryptography, American Mathematical Society (1991) 173–181.

    Google Scholar 

  3. M. Fischer and R. Wright, Multiparty secret key exchange using a random deal of cards, Proceedings of CRYPTO ’91, Springer-Verlag Lecture Notes in Computer Science, Vol 576 (1992) 141–155.

    Article  Google Scholar 

  4. P. Winkler, Cryptologic techniques in bidding and defense (Parts I, II, III, IV), Bridge Magazine (April-July 1981) 148–149, 186–187,226–227, 12–13.

    Google Scholar 

  5. P. Winkler, The advent of cryptology in the game of bridge, Cryptologia, vol. 7 (1983) 327–332.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peter Winkler .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Beaver, D., Haber, S., Winkler, P. (2013). On the Isolation of a Common Secret. In: Graham, R., Nešetřil, J., Butler, S. (eds) The Mathematics of Paul Erdős II. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7254-4_3

Download citation

Publish with us

Policies and ethics