“…In this section, we review the known works for realizing verifiable secret sharing, in particular, detection and identification of malicious actions. Some methods for realizing verifiable secret sharing include the process of using additional data called an authenticator that has a specific relationship with the secret input (hereinafter referred to as the authenticator method) [5]- [8], [10]- [13], the method of detecting and correcting false shares (or errors) using Reed-Solomon code (referred to as the RS method) [14], and a method that can verify the reconstructed result using only the distributed shares (for example, Harn et al's method [20]), etc.…”