Verifiable Secret Sharing - Round-Optimal and Efficient Verifiable Secret Sharing

Round-Optimal and Efficient Verifiable Secret Sharing

The round complexity of a VSS protocol is defined as the number of communication rounds in its sharing phase; reconstruction can always be done in a single round. There is no 1-round VSS with t > 1, regardless of the number of players. The bounds on perfect and efficient VSS protocols is given below.

Number of rounds Security
1 t = 1, n > 4
2 n > 4t
3 n > 3t

Read more about this topic:  Verifiable Secret Sharing

Famous quotes containing the words efficient, verifiable, secret and/or sharing:

    An efficient and valuable man does what he can, whether the community pay him for it or not. The inefficient offer their inefficiency to the highest bidder, and are forever expecting to be put into office. One would suppose that they were rarely disappointed.
    Henry David Thoreau (1817–1862)

    Man associates ideas not according to logic or verifiable exactitude, but according to his pleasure and interests. It is for this reason that most truths are nothing but prejudices.
    Rémy De Gourmont (1858–1915)

    This is the very worst wickedness, that we refuse to acknowledge the passionate evil that is in us. This makes us secret and rotten.
    —D.H. (David Herbert)

    The traditional American husband and father had the responsibilities—and the privileges—of playing the role of primary provider. Sharing that role is not easy. To yield exclusive access to the role is to surrender some of the potential for fulfilling the hero fantasy—a fantasy that appeals to us all. The loss is far from trivial.
    Faye J. Crosby (20th century)