Verifiable Secret Sharing as Secure Computation
We present a stronger notion of verifiable secret sharing and exhibit a protocol implementing it. We show that our new notion is preferable to the old ones whenever verifiable secret sharing is used as a tool within larger protocols, rather than being a goal in itself.
Main Authors: | Gennaro, Rosario, Micali, Silvio |
---|---|
Published: |
2023
|
Online Access: | https://hdl.handle.net/1721.1/149221 |
Similar Items
-
Theory and practice of verifiable secret sharing
by: Gennaro, Rosario
Published: (2005) -
Verifiably Secure Devices
by: Lepinski, Matt, et al.
Published: (2007) -
Secure Computation (Preliminary Report)
by: Micali, Silvio, et al.
Published: (2023) -
Succinct Computational Secret Sharing
by: Applebaum, Benny, et al.
Published: (2023) -
Bivariate polynomial-based secret sharing schemes with secure secret reconstruction
by: Ding, Jian, et al.
Published: (2022)