Cryptology ePrint Archive: Report 2003/035
On alternative approach for verifiable secret sharing
Kamil Kulesza and Zbigniew Kotulski and Josef Pieprzyk
Abstract: The proposed approach works for any underlying secret sharing scheme. It is based on the concept of verification sets of participants, related to authorized set of participants.
The participants interact (no third party involved) in order to check validity of their shares before they are pooled for secret recovery. Verification efficiency does not depend on the number of faulty participants.
Category / Keywords: cryptographic protocols / verifiable secret sharing
Date: received 21 Feb 2003, last revised 28 Feb 2003
Contact author: Kamil Kulesza at ippt gov pl
Available format(s): PDF | BibTeX Citation
Version: 20030228:133135 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]