Abstract
We present a general treatment of all non-cryptographic (i.e., information-theoretically secure) linear veri.able-secret-sharing (VSS) and distributed-commitment (DC) schemes, based on an underlying secret sharing scheme, pairwise checks between players, complaints, and accusations of the dealer. VSS and DC are main building blocks for unconditional secure multi-party computation protocols. This general approach covers all known linear VSS and DC schemes. The main theorem states that the security of a scheme is equivalent to a pure linear-algebra condition on the linear mappings (e.g. described as matrices and vectors) describing the scheme. The security of all known schemes follows as corollaries whose proofs are pure linear-algebra arguments, in contrast to some hybrid arguments used in the literature. Our approach is demonstrated for the CDM DC scheme, which we generalize to be secure against mixed adversary settings (some curious and some dishonest players), and for the classical BGW VSS scheme, for which we show that some of the checks between players are superfluous, i.e., the scheme is not optimal. More generally, our approach, establishing the minimal conditions for security (and hence the common denominator of the known schemes), can lead to the design of more e.cient VSS and DC schemes for general adversary structures.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
M. Ben-Or, S. Goldwasser, and A. Widgerson. Completeness theorems for noncryptographic fault-tolerant distributed computation. In 20th Annual ACM Symposium on the Theory of Computing. ACM Press, 1988.
P. Berman, J. A. Garay, and K. J. Perry. Towards optimal distributed consensus (extended abstract). In 30th Annual Symposium on Foundations of Computer Science. IEEE, 1989.
D. Chaum, C. Crepeau, and I. Damgård. Multiparty unconditional secure protocols. In 20th Annual ACM Symposium on the Theory of Computing. ACM Press, 1988.
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults (extended abstract). In 26th Annual Symposium on Foundations of Computer Science. IEEE, 1985.
R. Cramer, I. Damgård, and U. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In Advances in Cryptology-EUROCRYPT 2000, Lecture Notes in Computer Science. Springer, 2000.
M. Fitzi, M. Hirt, and U. Maurer. Trading correctness for privacy in unconditional multi-party computation. In Advances in Cryptology-CRYPTO’ 98, Lecture Notes in Computer Science. Springer, 1998. Corrected proceedings version.
M. Fitzi, M. Hirt, and U. Maurer. General adversaries in unconditional multiparty computation. In Advances in Cryptology-ASIACRYPT’ 99, Lecture Notes in Computer Science. Springer, 1999.
M. Fitzi and U. Maurer. Efficient byzantine agreement secure against general adversaries. In International Symposium on Distributed Computing (DISC), Lecture Notes in Computer Science. Springer, 1998.
R. Gennaro, Y. Ishai, E. Kushilevitz, and T. Rabin. The round complexity of verifiable secret sharing and secure multicast. In 33rd Annual ACM Symposium on the Theory of Computing. ACM Press, 2001.
M. Hirt and U. Maurer. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract). In 16th ACM Symposium on Principles of Distributed Computing, 1997. Final version appeared in Journal of Cryptology 2000.
M. Karchmer and A. Wigderson. On span programs. In 8th Annual Conference on Structure in Complexity Theory (SCTC’ 93). IEEE, 1993.
A. Shamir. How to share a secret. Communications of the Association for Computing Machinery, 22(11), 1979.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Serge, F., Ueli, M. (2002). Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks. In: Yung, M. (eds) Advances in Cryptology — CRYPTO 2002. CRYPTO 2002. Lecture Notes in Computer Science, vol 2442. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45708-9_36
Download citation
DOI: https://doi.org/10.1007/3-540-45708-9_36
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44050-5
Online ISBN: 978-3-540-45708-4
eBook Packages: Springer Book Archive