scholarly journals Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing

2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Seyed Amir Hosseini Beghaeiraveri ◽  
Mohammad Izadi ◽  
Mohsen Rezvani

Verifiable secret sharing (VSS) is one of the basic problems in the theory of distributed cryptography and has an important role in secure multiparty computation. In this case, it is tried to share a confidential data as secret, between multiple nodes in a distributed system, in the presence of an active adversary that can destroy some nodes, such that the secret can be reconstructed with the participation of certain size of honest nodes. A dynamic adversary can change its corrupted nodes among the protocol. So far, there is not a formal definition and there are no protocols of dynamic adversaries in VSS context. Also, another important question is, would there exist a protocol to share a secret with a static adversary with at most 1 broadcast round? In this paper, we provide a formal definition of the dynamic adversary. The simulation results prove the efficiency of the proposed protocol in terms of the runtime, the memory usage, and the number of message exchanges. We show that the change period of the dynamic adversary could not happen in less than 4 rounds in order to have a perfectly secure VSS, and then we establish a protocol to deal with this type of adversary. Also, we prove that the lower bound of broadcast complexity for the static adversary is (2,0)-broadcast rounds.

2013 ◽  
Vol 28 (1) ◽  
pp. 49-109 ◽  
Author(s):  
Arpita Patra ◽  
Ashish Choudhury ◽  
C. Pandu Rangan

1998 ◽  
Vol 5 (36) ◽  
Author(s):  
Ronald Cramer ◽  
Ivan B. Damgård ◽  
Stefan Dziembowski ◽  
Martin Hirt ◽  
Tal Rabin

We consider verifiable secret sharing (VSS) and multiparty computation (MPC) in the secure channels model, where a broadcast channel is given and a non-zero error probability is allowed. In this model Rabin and Ben-Or proposed VSS and MPC protocols, secure against an adversary that can corrupt any minority of the players. In this paper, we rst observe that a subprotocol of theirs, known as weak secret sharing (WSS), is not secure against an adaptive adversary, contrary to what was believed earlier. We then propose new and adaptively secure protocols for WSS, VSS and MPC that are substantially more efficient than the original ones. Our protocols generalize easily to provide security against general Q2 adversaries.


2021 ◽  
Vol 1752 (1) ◽  
pp. 012082
Author(s):  
Nurdin ◽  
S F Assagaf ◽  
F Arwadi

Sign in / Sign up

Export Citation Format

Share Document