Necessity and Realization of Universally Verifiable Secret Sharing
نویسنده
چکیده
We argue the necessity of universally veriiable secret sharing for secrets as individual users' cryptographic keys, and propose protocols to realize such secret sharing for two most common public-key cryptosystems: discrete logarithm based and integer factorization based. The universal veriiabil-ity achieves sharing secret with multi third parties as shareholders using two-party protocols in which a single veriier, who can be anybody, can verify the cor-rectness of a secret sharing for the (oo-line) multi shareholders. Several advantages result: (i) drop of the honesty requirement on the veriier and the shareholders , (ii) drop of the on-line availability requirement on the multi shareholders, and (iii) the simplicity of two-party protocols which provides users with freedom and exibility to choose multi shareholders they trust in real time of share distribution. The two-party protocols proposed in this work ooer a practical solution for secure data backup and key recovery services.
منابع مشابه
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions
A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...
متن کاملAn Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
متن کاملA Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic
A publicly verifiable secret sharing (PVSS) scheme is a verifiable secret sharing scheme with the property that the validity of the shares distributed by the dealer can be verified by any party; hence verification is not limited to the respective participants receiving the shares. We present a new construction for PVSS schemes, which compared to previous solutions by Stadler and later by Fujisa...
متن کاملUniversally Composable DKG with Linear Number of Exponentiations
Until now no distributed discrete-logarithm key generation (DKG) protocol is known to be universally composable. We extend Feldman’s verifiable secret sharing scheme to construct such a protocol. Our result holds for static adversaries corrupting a minority of the parties under the Decision Diffie-Hellman assumption in a weak common random string model in which the simulator does not choose the...
متن کاملA Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications
Abs t rac t . A publicly verifiable secret sharing (PVSS) scheme, named by Stadler in [Sta96], is a special VSS scheme in which anyone, not only the shareholders, can verify that the secret shares are correctly distributed. The property of public verifiability is what the first proposed VSS scheme [CGMA85] incorporated but later protocols [GMW87, Fe187, Ped911 failed to include. PVSS can provid...
متن کامل