In cryptography, a secret sharing scheme is publicly verifiable (PVSS) if it is a verifiable secret sharing scheme and if any party (not just the participants of the protocol) can verify the validity of the shares distributed by the dealer.
In verifiable secret sharing (VSS) the object is to resist malicious players, such as
(i) a dealer sending incorrect shares to some or all of the participants, and
(ii) participants submitting incorrect shares during the reconstruction protocol, cf. [CGMA85].
In publicly verifiable secret sharing (PVSS), as introduced by Stadler [Sta96], it is an explicit goal that not just the participants can verify their own shares, but that anybody can verify that the participants received correct shares. Hence, it is explicitly required that (i) can be verified publicly.
— Berry Schoenmakers. A Simple Publicly Verifiable Secret Sharing Scheme and its Application to Electronic Voting
The method introduced here according to the paper by Tang, Pei, Liu, and He is non-interactive and maintains this property throughout the protocol. [1]
Chaum–Pedersen protocol
A proposed protocol proving:
:
- The prover chooses a random

- The verifier sends a random challenge

- The prover responds with

- The verifier checks
and 
Denote this protocol as: 
A generalization of
is denoted as:
where as:
and
:
- The prover chooses a random
and sends
and 
- The verifier sends a random challenge
. - The prover responds with
,
. - The verifier checks
and 
The Chaum–Pedersen protocol is an interactive method and needs some modification to be used in a non-interactive way: Replacing the randomly chosen
by a 'secure hash' function with
as input value.
This page is based on this
Wikipedia article Text is available under the
CC BY-SA 4.0 license; additional terms may apply.
Images, videos and audio are available under their respective licenses.