Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,432,855 papers from all fields of science
Search
Sign In
Create Free Account
Verifiable secret sharing
Known as:
VSS
In cryptography, a secret sharing scheme is verifiable if auxiliary information is included that allows players to verify their shares as consistent…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Baruch Awerbuch
Commitment scheme
Cryptography
Discrete logarithm
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead
Aniket Kate
,
Andrew K. Miller
,
Thomas Yurek
arXiv.org
2019
Corpus ID: 62841497
In this work we present hbAVSS, the Honey Badger of Asynchronous Verifiable Secret Sharing (AVSS) protocols - an AVSS protocol…
Expand
2014
2014
Polynomial Differential-Based Information-Theoretically Secure Verifiable Secret Sharing
Qassim Al Mahmoud
2014
Corpus ID: 54821884
In Pedersen's VSS scheme the secret is embedded in commitments. And the polynomial used is of degree at most (t- 1). In strong…
Expand
2013
2013
A Novel (t, n) Threshold Secret Sharing Using Dot Product of Linearly Independent Vectors
Sonali D. Patil
,
P. Deshmukh
2013
Corpus ID: 212478840
: Threshold schemes are ideally suited to situations where a group of mutually suspicious individuals with conflicting interests…
Expand
2011
2011
Using Ciphertext Policy Attribute Based Encryption for Verifiable Secret Sharing
Nishant Doshi
,
D. Jinwala
2011
Corpus ID: 15099852
Threshold secret sharing schemes are used to divide a given secret by a dealer in parts such that no less than the threshold…
Expand
2010
2010
Verifiable Secret Sharing Scheme Based on ElGamal Cryptosystem
Liu Yi
2010
Corpus ID: 62966306
Based on ElGamal cryptosystem,a new verifiable secret sharing scheme was proposed.In this scheme,each participant's secret shadow…
Expand
2008
2008
Probabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary
A. Patra
,
A. Choudhary
,
B. V. Ashwinkumar
,
C. Rangan
IACR Cryptology ePrint Archive
2008
Corpus ID: 15789121
In this work, we focus on two basic secure distributed computation tasksProbabilistic Weak Secret Sharing (PWSS) and…
Expand
2005
2005
Verifiable threshold sharing of a large secret safe-prime
M. Ibrahim
International Conference on Information…
2005
Corpus ID: 16912795
Verifiable secret sharing schemes (VSS) are schemes for the purpose of ensuring that the players are sharing a unique secret and…
Expand
2003
2003
A Verifiable Secret Sharing Scheme with Statistical zero-knowledge
Chunming Tang
,
Zhuojun Liu
,
Mingsheng Wang
IACR Cryptology ePrint Archive
2003
Corpus ID: 15998519
In this paper, we first propose a protocol in which the prover can show that a = b holds for two committed integers a and b; also…
Expand
2002
2002
Applying General Access Structure to Proactive Secret Sharing Schemes
V. Nikov
,
S. Nikova
,
B. Preneel
,
J. Vandewalle
IACR Cryptology ePrint Archive
2002
Corpus ID: 6026755
Verifiable secret sharing schemes (VSS) are secret sharing schemes (SSS) dealing with possible cheating by participants. In this…
Expand
2002
2002
AN UNCONDITIONAL SECURE GENERAL VERIFIABLE SECRET SHARING PROTOCOL
Zhan. Fu
2002
Corpus ID: 63214906
The problem of how to design secure and efficient general verifiable secret sharing protocol is discussed. Based on the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE