scispace - formally typeset
Search or ask a question
Topic

Verifiable secret sharing

About: Verifiable secret sharing is a research topic. Over the lifetime, 4241 publications have been published within this topic receiving 99569 citations.


Papers
More filters
Proceedings ArticleDOI
23 Jun 2019
TL;DR: The first non-black-box zero-knowledge protocol was proposed in this paper, which is based on the homomorphic trapdoor paradigm, which can be seen as a nonblack box analog of the classic Feige-Lapidot-Shamir Trapdoor paradigm.
Abstract: The round complexity of zero-knowledge protocols is a long-standing open question, yet to be settled under standard assumptions. So far, the question has appeared equally challenging for relaxations such as weak zero-knowledge and witness hiding. Protocols satisfying these relaxed notions under standard assumptions have at least four messages, just like full-fledged zero-knowledge. The difficulty in improving round complexity stems from a fundamental barrier: none of these notions can be achieved in three messages via reductions (or simulators) that treat the verifier as a black box. We introduce a new non-black-box technique and use it to obtain the first protocols that cross this barrier under standard assumptions. We obtain weak zero-knowledge for in two messages, assuming the existence of quasipolynomially-secure fully-homomorphic encryption and other standard primitives (known based on the quasipolynomial hardness of Learning with Errors), and subexponentially-secure one-way functions. We also obtain weak zero-knowledge for in three messages under standard polynomial assumptions (following for example from fully homomorphic encryption and factoring). We also give, under polynomial assumptions, a two-message witness-hiding protocol for any language ∈ that has a witness encryption scheme. This protocol is publicly verifiable. Our technique is based on a new homomorphic trapdoor paradigm, which can be seen as a non-black-box analog of the classic Feige-Lapidot-Shamir trapdoor paradigm.

34 citations

Book ChapterDOI
01 Jan 2019
TL;DR: The complete voting system from the setup to the tally and the recovery procedures is detail here, which guarantees vote privacy and full verifiability, even against a compromised voting server.
Abstract: We present the electronic voting protocol Belenios together with its associated voting platform. Belenios guarantees vote privacy and full verifiability, even against a compromised voting server. While the core of the voting protocol was already described and formally proved secure, we detail here the complete voting system from the setup to the tally and the recovery procedures.

34 citations

Journal ArticleDOI
TL;DR: This paper shall try to improve the security of Lin and Wu's scheme while providing more efficient performance than other VMSS schemes in terms of computational complexity.

34 citations

Proceedings ArticleDOI
15 Oct 2018
TL;DR: This work introduces the first designated-verifier zk-SNARK based on lattice assumptions, which are believed to be post-quantum secure and proposes a protocol in which a proof consists of just 5 LWE encodings.
Abstract: Zero-knowledge SNARKs (zk-SNARKs) are non-interactive proof systems with short and efficiently verifiable proofs They elegantly resolve the juxtaposition of individual privacy and public trust, by providing an efficient way of demonstrating knowledge of secret information without actually revealing it To this day, zk-SNARKs are being used for delegating computation, electronic cryptocurrencies, and anonymous credentials However, all current SNARKs implementations rely on pre-quantum assumptions and, for this reason, are not expected to withstand cryptanalitic efforts over the next few decades In this work, we introduce the first designated-verifier zk-SNARK based on lattice assumptions, which are believed to be post-quantum secure We provide a generalization in the spirit of Gennaro et al (Eurocrypt'13) to the SNARK of Danezis et al (Asiacrypt'14) that is based on Square Span Programs (SSPs) and relies on weaker computational assumptions We focus on designated-verifier proofs and propose a protocol in which a proof consists of just 5 LWE encodings We provide a concrete choice of parameters as well as extensive benchmarks on a C implementation, showing that our construction is practically instantiable

34 citations

Journal ArticleDOI
TL;DR: This paper investigates the construction of efficient secret sharing schemes for several classes of access structures by using a technique called hypergraph decomposition, extending in a non-trivial way the previously studied graph decomposition techniques.

34 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
89% related
Encryption
98.3K papers, 1.4M citations
88% related
Authentication
74.7K papers, 867.1K citations
87% related
Server
79.5K papers, 1.4M citations
82% related
Time complexity
36K papers, 879.5K citations
81% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023284
2022643
2021225
2020288
2019233
2018228