{"title":"Investigation and Survey of Secret Sharing in Verifiable Distributed Systems","authors":"Kun Peng","doi":"10.1109/PDCAT.2011.47","DOIUrl":null,"url":null,"abstract":"The two most recent PVSS (publicly verifiable secret sharing) schemes are illustrated to be vulnerable to a simple attack. Moreover, one of them has to deteriorate its efficiency greatly to meet practical security requirement. The attack makes the share holders to receive incorrect shares, which will lead secret reconstruction to mistake. The efficiency deterioration is so serious that no practical application can tolerate it. So the two most recent PVSS schemes actually cannot work reliably and efficiently as they claim.","PeriodicalId":137617,"journal":{"name":"2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PDCAT.2011.47","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The two most recent PVSS (publicly verifiable secret sharing) schemes are illustrated to be vulnerable to a simple attack. Moreover, one of them has to deteriorate its efficiency greatly to meet practical security requirement. The attack makes the share holders to receive incorrect shares, which will lead secret reconstruction to mistake. The efficiency deterioration is so serious that no practical application can tolerate it. So the two most recent PVSS schemes actually cannot work reliably and efficiently as they claim.