On Sat, 13 Jan 2001, Ray Dillinger wrote:
No central server now, just needs a verifiable secret sharing scheme. Pedersen has one,
Cite, or URL? A verifiable secret sharing protocol could solve a *LOT* of protocol problems and I want to read it closely. (Thanks in advance for any pointers...)
Pedersen's verifiable secret sharing: Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor, Advances in Cryptology -- CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 129-140, 11-15 August 1991. Springer-Verlag, 1992 Stadler's publically verifiable secret sharing: http://citeseer.nj.nec.com/stadler96publicly.html Schoenmakers' publically verifiable secret sharing: http://www.win.tue.nl/math/dw/pp/berry/papers/crypto99.ps.gz Wenbo Mao explains what "publically verifiable" or "universally verifiable" means and why to use it: http://www.hp.co.uk/people/wm/papers/oak98.ps Rosario Gennaro's thesis on VSS: http://citeseer.nj.nec.com/72839.html Stinson's bibliography on secret sharing schemes: http://www.cacr.math.uwaterloo.ca/~dstinson/ssbib.html
and another is part of the Proactive Security work I mentioned previously.
On Byzantine Agreements? I have run into references to the topic, but it was never really clear what Byzantine Agreement really means.
Actually, I meant that a verifiable secret sharing scheme is used in the proactive security work. Thanks, -David