Verifiable Secret Sharing
In cryptography, a secret sharing scheme is verifiable if auxiliary information is included that allows players to verify their shares as consistent. More formally, verifiable secret sharing ensures that even if the dealer is malicious there is a well-defined secret that the players can later reconstruct. (In standard secret sharing, the dealer is assumed to be honest.) The concept of verifiable secret sharing (VSS) was first introduced in 1985 by Benny Chor, Shafi Goldwasser, Silvio Micali and Baruch Awerbuch.
In a VSS protocol a distinguished player who wants to share the secret is referred to as the dealer. The protocol consists of two phases: a sharing phase and a reconstruction phase.
Sharing: Initially the dealer holds secret as input and each player holds an independent random input. The sharing phase may consist of several rounds. At each round each player can privately send messages to other players and it can also broadcast a message. Each message sent or broadcast by a player is determined by its input, its random input and messages received from other players in previous rounds.
Reconstruction: In this phase each player provides its entire view from the sharing phase and a reconstruction function is applied and is taken as the protocol's output.
An alternative definition given by Oded Goldreich defines VSS as a secure multi-party protocol for computing the randomized functionality corresponding to some (non-verifiable) secret sharing scheme. This definition is stronger than that of the other definitions and is very convenient to use in the context of general secure multi-party computation.
Verifiable secret sharing is important for secure multiparty computation. Multiparty computation is typically accomplished by making secret shares of the inputs, and manipulating the shares to compute some function. To handle "active" adversaries (that is, adversaries that corrupt nodes and then make them deviate from the protocol), the secret sharing scheme needs to be verifiable to prevent the deviating nodes from throwing off the protocol.
Read more about Verifiable Secret Sharing: Feldman’s Scheme, Benaloh’s Scheme, Secret Ballot Elections, Round-Optimal and Efficient Verifiable Secret Sharing
Famous quotes containing the words verifiable, secret and/or sharing:
“The entire construct of the medical model of mental illnessMwhat is it but an analogy? Between physical medicine and psychiatry: the mind is said to be subject to disease in the same manner as the body. But whereas in physical medicine there are verifiable physiological proofsin damaged or affected tissue, bacteria, inflammation, cellular irregularityin mental illness alleged socially unacceptable behavior is taken as a symptom, even as proof, of pathology.”
—Kate Millett (b. 1934)
“The secret of the truly successful, I believe, is that they learned very early in life how not to be busy. They saw through that adage, repeated to me so often in childhood, that anything worth doing is worth doing well. The truth is, many things are worth doing only in the most slovenly, halfhearted fashion possible, and many other things are not worth doing at all.”
—Barbara Ehrenreich (b. 1941)
“The meaning of the Street in all ways and at all times is the need for sharing life with others and the search for community.”
—Virginia Hamilton (b. 1936)