Publicly Verifiable Secret Sharing (PVSS) allows a dealer to publish encrypted shares of a secret so that parties holding the corresponding decryption keys may later reconstruct it. Both dealing and reconstruction are non-interactive and any verifier can check their validity. PVSS finds applications in randomness beacons, distributed key generation (DKG) and in YOSO MPC (Gentry et al. CRYPTO\u2721), when endowed with suitable publicly verifiable re-sharing as in YOLO YOSO (Cascudo et al. ASIACRYPT\u2722). We introduce a PVSS scheme over class groups that achieves similar efficiency to state-of-the art schemes that only allow for reconstructing a function of the secret, while our scheme allows the reconstruction of the original secret. Our ...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
Verifiable secret sharing (VSS) protocols enable parties to share secrets while guaranteeing securit...
Abstract. Running the key-management service of cryptographic sys-tems in the cloud is an attractive...
We put forward the first non-interactive verifiable secret sharing scheme (NI-VSS) using classgroups...
Distributed key generation (DKG) is widely used in multi-party computation and decentralized applica...
A Publicly Verifiable Secret Sharing (PVSS) scheme allows anyone to verify the validity of the share...
We present a non-interactive publicly verifiable secret sharing scheme where a dealer can construct ...
Abstract. A publicly verifiable secret sharing (PVSS) scheme, named by Stadler in [Sta96], is a spec...
. A secret sharing scheme allows to share a secret among several participants such that only certain...
Broadcast and verifiable secret sharing (VSS) are central building blocks for secure multi-party com...
For conventional secret sharing, if cheaters can submit possibly forged shares after observing share...
In the second chapter, the notion of a social secret sharing (SSS) scheme is introduced in which sha...
Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sharing protocol...
In classical secret sharing schemes a dealer shares a secret among a set of participants in such a w...
Part 8: Authentication and Secret SharingInternational audienceVSS (verifiable secret sharing) is an...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
Verifiable secret sharing (VSS) protocols enable parties to share secrets while guaranteeing securit...
Abstract. Running the key-management service of cryptographic sys-tems in the cloud is an attractive...
We put forward the first non-interactive verifiable secret sharing scheme (NI-VSS) using classgroups...
Distributed key generation (DKG) is widely used in multi-party computation and decentralized applica...
A Publicly Verifiable Secret Sharing (PVSS) scheme allows anyone to verify the validity of the share...
We present a non-interactive publicly verifiable secret sharing scheme where a dealer can construct ...
Abstract. A publicly verifiable secret sharing (PVSS) scheme, named by Stadler in [Sta96], is a spec...
. A secret sharing scheme allows to share a secret among several participants such that only certain...
Broadcast and verifiable secret sharing (VSS) are central building blocks for secure multi-party com...
For conventional secret sharing, if cheaters can submit possibly forged shares after observing share...
In the second chapter, the notion of a social secret sharing (SSS) scheme is introduced in which sha...
Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sharing protocol...
In classical secret sharing schemes a dealer shares a secret among a set of participants in such a w...
Part 8: Authentication and Secret SharingInternational audienceVSS (verifiable secret sharing) is an...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
Verifiable secret sharing (VSS) protocols enable parties to share secrets while guaranteeing securit...
Abstract. Running the key-management service of cryptographic sys-tems in the cloud is an attractive...