<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Publicly_Verifiable_Secret_Sharing</id>
	<title>Publicly Verifiable Secret Sharing - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Publicly_Verifiable_Secret_Sharing"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Publicly_Verifiable_Secret_Sharing&amp;action=history"/>
	<updated>2026-05-15T12:36:22Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=Publicly_Verifiable_Secret_Sharing&amp;diff=2457&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;In cryptography, a secret sharing scheme is '''publicly verifiable''' (PVSS) if it is a verifiable secret sharing scheme and if any party involved can verify the v...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Publicly_Verifiable_Secret_Sharing&amp;diff=2457&amp;oldid=prev"/>
		<updated>2019-03-23T07:27:28Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;In &lt;a href=&quot;/index.php?title=Cryptography&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Cryptography (page does not exist)&quot;&gt;cryptography&lt;/a&gt;, a &lt;a href=&quot;/index.php?title=Secret_sharing&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Secret sharing (page does not exist)&quot;&gt;secret sharing&lt;/a&gt; scheme is &amp;#039;&amp;#039;&amp;#039;publicly verifiable&amp;#039;&amp;#039;&amp;#039; (PVSS) if it is a &lt;a href=&quot;/index.php?title=Verifiable_secret_sharing&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Verifiable secret sharing (page does not exist)&quot;&gt;verifiable secret sharing&lt;/a&gt; scheme and if any party involved can verify the v...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;In [[cryptography]], a [[secret sharing]] scheme is '''publicly verifiable''' (PVSS) if it is a [[verifiable secret sharing]] scheme and if any party involved can verify the validity of the shares distributed by the dealer.&lt;br /&gt;
&lt;br /&gt;
The method introduced here according to the paper by [http://eprint.iacr.org/2004/201.ps Chunming Tang, Dingyi Pei, Zhuo Liu, and Yong He] is non-interactive and maintains this property throughout the protocol.&lt;br /&gt;
&lt;br /&gt;
==Initialization==&lt;br /&gt;
The PVSS scheme dictates an initialization process in which: &lt;br /&gt;
#All system parameters are generated.&lt;br /&gt;
#Each participant must have a registered public key.&lt;br /&gt;
&lt;br /&gt;
Excluding the initialization process, the PVSS consists of two phases:&lt;br /&gt;
&lt;br /&gt;
==Distribution==&lt;br /&gt;
1.Distribution of secret &amp;lt;math&amp;gt;s&amp;lt;/math&amp;gt; shares is performed by the dealer &amp;lt;math&amp;gt;D&amp;lt;/math&amp;gt;, which does the following:&lt;br /&gt;
* The dealer creates &amp;lt;math&amp;gt;s_{1},s_{2}...s_{n}&amp;lt;/math&amp;gt; for each participant &amp;lt;math&amp;gt;P_{1},P_{2}...P_{n}&amp;lt;/math&amp;gt; respectively.&lt;br /&gt;
* The dealer publishes the encrypted share &amp;lt;math&amp;gt;E_{i}(s_{i})&amp;lt;/math&amp;gt; for each &amp;lt;math&amp;gt;P_{i}&amp;lt;/math&amp;gt;.&lt;br /&gt;
* The dealer also publishes a string &amp;lt;math&amp;gt;\mathrm{proof}_{D}&amp;lt;/math&amp;gt; to show that each &amp;lt;math&amp;gt;E_{i}&amp;lt;/math&amp;gt; encrypts &amp;lt;math&amp;gt;s_{i}&amp;lt;/math&amp;gt;&lt;br /&gt;
(note: &amp;lt;math&amp;gt;\mathrm{proof}_{D}&amp;lt;/math&amp;gt; guarantees that the reconstruction protocol will result in the same &amp;lt;math&amp;gt;s&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
2. Verification of the shares:&lt;br /&gt;
* Anybody knowing the public keys for the encryption methods &amp;lt;math&amp;gt;E_{i}&amp;lt;/math&amp;gt;, can verify the shares.&lt;br /&gt;
* If one or more verifications fails the dealer fails and the protocol is aborted.&lt;br /&gt;
&lt;br /&gt;
==Reconstruction==&lt;br /&gt;
1. Decryption of the shares:&lt;br /&gt;
* The Participants &amp;lt;math&amp;gt;P_{i}&amp;lt;/math&amp;gt; decrypts their share of the secret &amp;lt;math&amp;gt;s_{i}&amp;lt;/math&amp;gt; using &amp;lt;math&amp;gt;E_{i}(s_{i})&amp;lt;/math&amp;gt;.&lt;br /&gt;
(note: fault-tolerance can be allowed here: it's not required that all participants succeed in decrypting &amp;lt;math&amp;gt;E_{i}(s_{i})&amp;lt;/math&amp;gt; as long as a qualified set of participants are successful to decrypt &amp;lt;math&amp;gt;s_{i}&amp;lt;/math&amp;gt;).&lt;br /&gt;
* The participant release &amp;lt;math&amp;gt;s_{i}&amp;lt;/math&amp;gt; plus a string &amp;lt;math&amp;gt;\mathrm{proof}_{P_{i}}&amp;lt;/math&amp;gt; this shows the released share is correct.&lt;br /&gt;
&lt;br /&gt;
2. Pooling the shares:&lt;br /&gt;
* Using the strings &amp;lt;math&amp;gt;\mathrm{proof}_{P_{i}}&amp;lt;/math&amp;gt; to exclude the participants which are dishonest or failed to decrypt &amp;lt;math&amp;gt;E_{i}(s_{i})&amp;lt;/math&amp;gt;.&lt;br /&gt;
* Reconstruction &amp;lt;math&amp;gt;s&amp;lt;/math&amp;gt; can be done from the shares of any qualified set of participants.&lt;br /&gt;
&lt;br /&gt;
==Chaums and Pedersen Scheme==&lt;br /&gt;
A proposed protocol proving: &amp;lt;math&amp;gt;\log_{_{g1}}h_{1} = \log_{_{g2}}h_{2}&amp;lt;/math&amp;gt; :&lt;br /&gt;
#The prover chooses a random &amp;lt;math&amp;gt;r\in \boldsymbol{\Zeta}_{q^*} &amp;lt;/math&amp;gt;&lt;br /&gt;
#The verifier send a random challenge &amp;lt;math&amp;gt;c \in _{R}\boldsymbol{\Zeta}_{q} &amp;lt;/math&amp;gt;&lt;br /&gt;
#The prover responds with &amp;lt;math&amp;gt;s = r - c x(\mathrm{mod}\,q)&amp;lt;/math&amp;gt;&lt;br /&gt;
#The verifier checks &amp;lt;math&amp;gt;\alpha_1 = g_{1}^s h_{1}^c &amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\alpha_2 = g_{2}^s h_{2}^c &amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Denote this protocol as: &amp;lt;math&amp;gt;\mathrm{dleq}(g_1, h_1,g_2,h_2)&amp;lt;/math&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
A generalization of &amp;lt;math&amp;gt;\mathrm{dleq}(g_1, h_1,g_2,h_2)&amp;lt;/math&amp;gt; is denoted as: &amp;lt;math&amp;gt;\text{dleq}(X, Y, g_1, h_1,g_2,h_2)&amp;lt;/math&amp;gt; where as: &amp;lt;math&amp;gt;X = g_{1}^{x_1}g_{2}^{x_2}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Y = h_{1}^{x_1}h_{2}^{x_2}&amp;lt;/math&amp;gt;:&lt;br /&gt;
#The prover chooses a random &amp;lt;math&amp;gt; r_1,r_2 \in Z_{q}^*&amp;lt;/math&amp;gt; and sends &amp;lt;math&amp;gt;t_1 = g_{1}^{r_1} g_{2}^{r_2}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;t_2 = h_{1}^{r_1} h_{2}^{r_2}&amp;lt;/math&amp;gt;&lt;br /&gt;
#The verifier send a random challenge &amp;lt;math&amp;gt;c \in _{R}\boldsymbol{\Zeta}_{q} &amp;lt;/math&amp;gt;.&lt;br /&gt;
#The prover responds with &amp;lt;math&amp;gt;s_1 = r_1 - cx_1 (\mathrm{mod}\,q) &amp;lt;/math&amp;gt; , &amp;lt;math&amp;gt;s_2 = r_2 - cx_2 (\mathrm{mod}\,q) &amp;lt;/math&amp;gt;.&lt;br /&gt;
#The verifier checks &amp;lt;math&amp;gt;t_1 = X^c g_{1}^{s_1}g_{2}^{s_2}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;t_2 = Y^c h_{1}^{s_1}h_{2}^{s_2}&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Chaums and Pedersen method is an interactive method and needs some modification to be used in a non-interactive way:&lt;br /&gt;
Replacing the randomly chosen &amp;lt;math&amp;gt;c&amp;lt;/math&amp;gt; by a 'secure hash' function with &amp;lt;math&amp;gt;m&amp;lt;/math&amp;gt; as input value.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Source==&lt;br /&gt;
[http://wikipedia.org/ http://wikipedia.org/]&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptography]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>