A Survey on Perfectly Secure Verifiable Secret-sharing

被引:28
作者
Chandramouli, Anirudh [1 ]
Choudhury, Ashish [1 ]
Patra, Arpita [2 ]
机构
[1] Int Inst Informat Technol Bangalore, 26-C Electron City,Hosur Rd, Bangalore 560100, Karnataka, India
[2] Indian Inst Sci, Dept Comp Sci & Automat, Bangalore 560012, Karnataka, India
关键词
Secret-sharing; Byzantine corruptions; Synchronous and Asynchronous Network; MULTIPARTY COMPUTATION; ROUND COMPLEXITY; AGREEMENT; PROTOCOLS;
D O I
10.1145/3512344
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure distributed computing. It is used as a building block in several distributed computing tasks, such as Byzantine agreement and secure multi-party computation. In this article, we consider VSS schemes with perfect security, tolerating computationally unbounded adversaries. We comprehensively survey the existing perfectly secure VSS schemes in three different communication settings, namely, synchronous, asynchronous, and hybrid setting and provide full details of the existing schemes in these settings. The aim of this survey is to provide a clear knowledge and foundation to researchers who are interested in knowing and extending the state-of-the-art perfectly secure VSS schemes.
引用
收藏
页数:36
相关论文
共 55 条
[1]   Revisiting Asynchronous Fault Tolerant Computation with Optimal Resilience [J].
Abraham, Ittai ;
Dolev, Danny ;
Stern, Gilad .
PROCEEDINGS OF THE 39TH SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, PODC 2020, 2020, :139-148
[2]   Sync HotStuff: Simple and Practical Synchronous State Machine Replication [J].
Abraham, Ittai ;
Malkhi, Dahlia ;
Nayak, Kartik ;
Ren, Ling ;
Yin, Maofan .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :106-118
[3]  
[Anonymous], 1983, The Theory of Error-Correcting Codes
[4]   The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency (Extended Abstract) [J].
Applebaum, Benny ;
Kachlon, Eliran ;
Patra, Arpita .
2020 IEEE 61ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2020), 2020, :1277-1284
[5]   A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation [J].
Asharov, Gilad ;
Lindell, Yehuda .
JOURNAL OF CRYPTOLOGY, 2017, 30 (01) :58-151
[6]  
Backes M, 2011, LECT NOTES COMPUT SC, V7073, P590, DOI 10.1007/978-3-642-25385-0_32
[7]   Round Efficient Computationally Secure Multi-party Computation Revisited [J].
Bangalore, Laasya ;
Choudhury, Ashish ;
Garimella, Gayathri .
ICDCN '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2019, :292-301
[8]  
Beerliová-Trubíniová Z, 2008, LECT NOTES COMPUT SC, V4948, P213, DOI 10.1007/978-3-540-78524-8_13
[9]  
Beerliová-Trubíniová Z, 2007, LECT NOTES COMPUT SC, V4833, P376
[10]   On the Theoretical Gap Between Synchronous and Asynchronous MPC Protocols [J].
Beerliova-Trubiniova, Zuzana ;
Hirt, Martin ;
Nielsen, Jesper Buus .
PODC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2010, :211-218