Verifiable Secret Sharing as Secure Computation
We present a stronger notion of verifiable secret sharing and exhibit a protocol implementing it. We show that our new notion is preferable to the old ones whenever verifiable secret sharing is used as a tool within larger protocols, rather than being a goal in itself.
Main Authors: | , |
---|---|
Published: |
2023
|
Online Access: | https://hdl.handle.net/1721.1/149221 |
_version_ | 1826201537179811840 |
---|---|
author | Gennaro, Rosario Micali, Silvio |
author_facet | Gennaro, Rosario Micali, Silvio |
author_sort | Gennaro, Rosario |
collection | MIT |
description | We present a stronger notion of verifiable secret sharing and exhibit a protocol implementing it. We show that our new notion is preferable to the old ones whenever verifiable secret sharing is used as a tool within larger protocols, rather than being a goal in itself. |
first_indexed | 2024-09-23T11:53:16Z |
id | mit-1721.1/149221 |
institution | Massachusetts Institute of Technology |
last_indexed | 2024-09-23T11:53:16Z |
publishDate | 2023 |
record_format | dspace |
spelling | mit-1721.1/1492212023-03-30T03:48:43Z Verifiable Secret Sharing as Secure Computation Gennaro, Rosario Micali, Silvio We present a stronger notion of verifiable secret sharing and exhibit a protocol implementing it. We show that our new notion is preferable to the old ones whenever verifiable secret sharing is used as a tool within larger protocols, rather than being a goal in itself. 2023-03-29T14:37:38Z 2023-03-29T14:37:38Z 1994-03 https://hdl.handle.net/1721.1/149221 MIT-LCS-TM-502 application/pdf |
spellingShingle | Gennaro, Rosario Micali, Silvio Verifiable Secret Sharing as Secure Computation |
title | Verifiable Secret Sharing as Secure Computation |
title_full | Verifiable Secret Sharing as Secure Computation |
title_fullStr | Verifiable Secret Sharing as Secure Computation |
title_full_unstemmed | Verifiable Secret Sharing as Secure Computation |
title_short | Verifiable Secret Sharing as Secure Computation |
title_sort | verifiable secret sharing as secure computation |
url | https://hdl.handle.net/1721.1/149221 |
work_keys_str_mv | AT gennarorosario verifiablesecretsharingassecurecomputation AT micalisilvio verifiablesecretsharingassecurecomputation |