We present a non-interactive publicly verifiable secret sharing scheme where a dealer can construct a Shamir secret sharing of a field element and confidentially yet verifiably distribute shares to multiple receivers. We also develop a non-interactive publicly verifiable resharing scheme where existing share holders of a Shamir secret sharing can create a new Shamir secret sharing of the same secret and distribute it to a set of receivers in a confidential, yet verifiable manner. A public key may be associated with the secret being shared in the form of a group element raised to the secret field element. We use our verifiable secret sharing scheme to construct a non-interactive distributed key generation protocol that creates such a public...
Many threshold systems require some kind of secret sharing during their set-up phase. There has been...
Publicly Verifiable Secret Sharing (PVSS) allows a dealer to publish encrypted shares of a secret so...
The paper describes an implementation of Shamir secret sharing schemes based on exponentiation in Ga...
We present a new distributed, group ElGamal public key generation algorithm which also permits maint...
Secret sharing is a mechanism by which a trusted dealer holding a secret “splits ” the secret into m...
Threshold cryptography increases security and resilience by sharing a private cryptographic key over...
Secret sharing (SS) is a cryptographic method proposed independently by Adi Shamir and George Blakle...
In the second chapter, the notion of a social secret sharing (SSS) scheme is introduced in which sha...
Distributed key generation (DKG) is widely used in multi-party computation and decentralized applica...
In recent decades, many researchers have investigated peer-to-peer security and cryptography such as...
Numerous cryptographic applications require a trusted authority to hold a secret. With a plethora o...
We present a method for converting shares of a secret into shares of the same secret in a different ...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
A Key Distribution Center of a network is a server who generates anddistributes secret keys to group...
We present a new class of distributed key generation and recoveryalgorithms suitable for group commu...
Many threshold systems require some kind of secret sharing during their set-up phase. There has been...
Publicly Verifiable Secret Sharing (PVSS) allows a dealer to publish encrypted shares of a secret so...
The paper describes an implementation of Shamir secret sharing schemes based on exponentiation in Ga...
We present a new distributed, group ElGamal public key generation algorithm which also permits maint...
Secret sharing is a mechanism by which a trusted dealer holding a secret “splits ” the secret into m...
Threshold cryptography increases security and resilience by sharing a private cryptographic key over...
Secret sharing (SS) is a cryptographic method proposed independently by Adi Shamir and George Blakle...
In the second chapter, the notion of a social secret sharing (SSS) scheme is introduced in which sha...
Distributed key generation (DKG) is widely used in multi-party computation and decentralized applica...
In recent decades, many researchers have investigated peer-to-peer security and cryptography such as...
Numerous cryptographic applications require a trusted authority to hold a secret. With a plethora o...
We present a method for converting shares of a secret into shares of the same secret in a different ...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
A Key Distribution Center of a network is a server who generates anddistributes secret keys to group...
We present a new class of distributed key generation and recoveryalgorithms suitable for group commu...
Many threshold systems require some kind of secret sharing during their set-up phase. There has been...
Publicly Verifiable Secret Sharing (PVSS) allows a dealer to publish encrypted shares of a secret so...
The paper describes an implementation of Shamir secret sharing schemes based on exponentiation in Ga...