\begin{enumerate} \item There exists an efficient 2-round VSS protocol for $n = 3t + 1$. If we assume that the adversary is non-rushing then we can achieve a 1-round reconstruction phase.
\item There exists an efficient 1-round VSS for $t = 1$ and $n > 3$.
\item We prove that our results are optimal both in resilience and number of sharing rounds by showing:
\begin{enumerate}
\item There does not exist a 2-round WSS \footnote{WSS is a weaker notion of VSS.} (and hence VSS) for $n \leq 3t$. \item There does not exist a 1-round VSS protocol for $t \geq 2$ and $n \geq 4$. \end{enumerate}
\end{enumerate}
Category / Keywords: Foundations, VSS, Information Theoretic Security Publication Info: This is a full version of thepaper that is accepted in CRYPTO 2009 Date: received 15 Apr 2008, last revised 4 Jun 2009 Contact author: arpitapatra_10 at yahoo co in, talr@us ibm com Available formats: PDF | BibTeX Citation Note: This paper is the combined version of our two papers titled "Probabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary" and "Efficient Protocol for Generating IC Signature and its Application to Unconditional Verifiable Secret Sharing", which appeared earlier as ePrint Archive report no 2008/101 and 2008/172 respectively. The article 2008/172 was based on the improvement of the results of article 2008/101. However, there was a minor common bug in both the papers, which could be easily rectified. So instead of rectifying the bug separately in each paper, we corrected it and combined both the papers. We also changed the title of the combined paper as we found the new title to be more appropriate.Version: 20090605:054053 (All versions of this report) Discussion forum: Show discussion | Start new discussion