Cryptology ePrint Archive: Report 2003/035

On alternative approach for verifiable secret sharing

Kamil Kulesza and Zbigniew Kotulski and Josef Pieprzyk

Abstract: The proposed approach works for any underlying secret sharing scheme. It is based on the concept of verification sets of participants, related to authorized set of participants. The participants interact (no third party involved) in order to check validity of their shares before they are pooled for secret recovery. Verification efficiency does not depend on the number of faulty participants.

Category / Keywords: cryptographic protocols / verifiable secret sharing

Date: received 21 Feb 2003, last revised 28 Feb 2003

Contact author: Kamil Kulesza at ippt gov pl

Available format(s): PDF | BibTeX Citation

Version: 20030228:133135 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]