We put forward the first non-interactive verifiable secret sharing scheme (NI-VSS) using classgroups – we call it cgVSS. Our construction follows the standard framework of encrypting the shares to a set of recipients and generating a non-interactive proof of correct sharing. However, as opposed to prior works, such as Groth’s [Eprint 2021], or Gentry et al.’s [Eurocrypt 2022], we do not require any range proof - this is possible due to the unique structure of class groups, that enables efficient encryption/decryption of large field elements in the exponent of an ElGamal-style encryption scheme. Importantly, this is possible without destroying the additive homomorphic structure, which is required to make the proof-of-correctness highly effic...
Broadcast and verifiable secret sharing (VSS) are central building blocks for secure multi-party com...
Verifiable secret sharing schemes (VSS) are schemes for the purpose of ensuring that the players are...
This paper presents a non-interactive veriable secret shar- ing scheme (VSS) tolerating a dishonest ...
Publicly Verifiable Secret Sharing (PVSS) allows a dealer to publish encrypted shares of a secret so...
A Publicly Verifiable Secret Sharing (PVSS) scheme allows anyone to verify the validity of the share...
Abstract. A publicly verifiable secret sharing (PVSS) scheme, named by Stadler in [Sta96], is a spec...
. A secret sharing scheme allows to share a secret among several participants such that only certain...
Part 8: Authentication and Secret SharingInternational audienceVSS (verifiable secret sharing) is an...
Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sharing protocol...
Verifiable secret sharing (VSS) protocols enable parties to share secrets while guaranteeing securit...
An $(n, t)$-Non-Interactive Verifiable Secret Sharing (NI-VSS) scheme allows a dealer to share a sec...
Distributed key generation (DKG) is widely used in multi-party computation and decentralized applica...
We generalise and improve the security and efficiency of the verifiable encryption scheme of Asokan ...
A publicly verifiable secret sharing (PVSS) scheme is a verifiable secret sharing scheme with the pr...
We present a non-interactive publicly verifiable secret sharing scheme where a dealer can construct ...
Broadcast and verifiable secret sharing (VSS) are central building blocks for secure multi-party com...
Verifiable secret sharing schemes (VSS) are schemes for the purpose of ensuring that the players are...
This paper presents a non-interactive veriable secret shar- ing scheme (VSS) tolerating a dishonest ...
Publicly Verifiable Secret Sharing (PVSS) allows a dealer to publish encrypted shares of a secret so...
A Publicly Verifiable Secret Sharing (PVSS) scheme allows anyone to verify the validity of the share...
Abstract. A publicly verifiable secret sharing (PVSS) scheme, named by Stadler in [Sta96], is a spec...
. A secret sharing scheme allows to share a secret among several participants such that only certain...
Part 8: Authentication and Secret SharingInternational audienceVSS (verifiable secret sharing) is an...
Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sharing protocol...
Verifiable secret sharing (VSS) protocols enable parties to share secrets while guaranteeing securit...
An $(n, t)$-Non-Interactive Verifiable Secret Sharing (NI-VSS) scheme allows a dealer to share a sec...
Distributed key generation (DKG) is widely used in multi-party computation and decentralized applica...
We generalise and improve the security and efficiency of the verifiable encryption scheme of Asokan ...
A publicly verifiable secret sharing (PVSS) scheme is a verifiable secret sharing scheme with the pr...
We present a non-interactive publicly verifiable secret sharing scheme where a dealer can construct ...
Broadcast and verifiable secret sharing (VSS) are central building blocks for secure multi-party com...
Verifiable secret sharing schemes (VSS) are schemes for the purpose of ensuring that the players are...
This paper presents a non-interactive veriable secret shar- ing scheme (VSS) tolerating a dishonest ...