2011
DOI: 10.1007/978-3-642-25385-0_32
|View full text |Cite
|
Sign up to set email alerts
|

Computational Verifiable Secret Sharing Revisited

Abstract: Verifiable secret sharing (VSS) is an important primitive in distributed cryptography that allows a dealer to share a secret among n parties in the presence of an adversary controlling at most t of them. In the computational setting, the feasibility of VSS schemes based on commitments was established over two decades ago. Interestingly, all known computational VSS schemes rely on the homomorphic nature of these commitments or achieve weaker guarantees. As homomorphism is not inherent to commitments or to the c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 47 publications
(22 citation statements)
references
References 40 publications
0
22
0
Order By: Relevance
“…Our Sup-Sh protocol is almost equivalent to the AVSS primitive [CKAS02,Can96,BKP11]: it allows a dealer D to "verifiably" share a secret s, thus generating [s], and ensures that at least one honest party is privileged to obtain all the n shares encrypted for the respective share holders. The existing computational AVSS protocols (e.g., [CKAS02,BKP11]) are designed with n = 3t + 1 and are based on sharing a secret using a bivariate polynomial of degree t in each variable and (homomorphic) commitments. In this paradigm, it is ensured that D has distributed "consistent" shares to n − t = 2t + 1 parties such that (at least) t + 1 honest parties among them can "enable" the remaining parties to get their shares.…”
Section: Important Sub-protocols For the Preprocessing Phasementioning
confidence: 99%
See 1 more Smart Citation
“…Our Sup-Sh protocol is almost equivalent to the AVSS primitive [CKAS02,Can96,BKP11]: it allows a dealer D to "verifiably" share a secret s, thus generating [s], and ensures that at least one honest party is privileged to obtain all the n shares encrypted for the respective share holders. The existing computational AVSS protocols (e.g., [CKAS02,BKP11]) are designed with n = 3t + 1 and are based on sharing a secret using a bivariate polynomial of degree t in each variable and (homomorphic) commitments. In this paradigm, it is ensured that D has distributed "consistent" shares to n − t = 2t + 1 parties such that (at least) t + 1 honest parties among them can "enable" the remaining parties to get their shares.…”
Section: Important Sub-protocols For the Preprocessing Phasementioning
confidence: 99%
“…Now using the homomorphic property of commitments every party can compute the remaining committed shares and Com s , thus possessing all the necessary information of [s]. Given [s] generated using Sh, protocol Rec is based on the standard reconstruction protocol used in the existing computationally secure AVSS [BKP11,CKAS02], which allows the parties to robustly reconstruct s. In the protocol, each party sends its share-pair to all the parties, which are verified with the corresponding commitment, available with the parties (as part of [s]). Once t + 1 "correct" share pairs are received, the sharing polynomial, and hence s, is reconstructed.…”
Section: Our Avss Protocolmentioning
confidence: 99%
“…This allows us to have more meaningful comparisons with other VSS protocols. We will compare our solution to the 4-round statistical VSS of [27], the 3-round VSS of [32], and the 2-round VSS of [3] (see Table 1). These protocols have different security models and different optimization goals, therefore also selecting different methods for securing communication between parties.…”
Section: Example: Verifiable Shamir Secret Sharingmentioning
confidence: 99%
“…The 2-round VSS of [3] This protocol also uses commitments that do not have to be homomorphic. This is still different from F tr and ICP : commitments can ensure that the same message has been transmitted to distinct parties.…”
Section: Example: Verifiable Shamir Secret Sharingmentioning
confidence: 99%
“…Next, in the reconstruction phase, the shares are combined by the nodes to either (1) recover the same secret s or (2) tag the dealer as cheater. In this work, we use the (n − 1)/2-tolerant probabilistic VSS protocol of [38]. Accordingly, the RNG protocol in a set S of nodes proceeds as follows: (1) each node i in S chooses a random number r i ∈ F. (2) Each node i acts as a dealer and shares r i using the VSS protocol.…”
Section: ) Random Number Generation (Rng)mentioning
confidence: 99%