Consensus Actions in Cipherspace?

dmolnar dmolnar at hcs.harvard.edu
Sun Jan 14 06:12:11 PST 2001




On Sat, 13 Jan 2001, Ray Dillinger wrote:

> >No central server now, just needs a verifiable secret sharing scheme.
> >Pedersen has one, 
> 
> Cite, or URL?  A verifiable secret sharing protocol could solve a *LOT* 
> of protocol problems and I want to read it closely. (Thanks in advance 
> for any pointers...)

Pedersen's verifiable secret sharing:
Non-interactive and information-theoretic secure verifiable secret
sharing. In J. Feigenbaum, editor, Advances in Cryptology -- CRYPTO '91,
volume 576 of Lecture Notes in Computer Science, pages 129-140, 11-15
August 1991. Springer-Verlag, 1992

Stadler's publically verifiable secret sharing:
http://citeseer.nj.nec.com/stadler96publicly.html

Schoenmakers' publically verifiable secret sharing:
http://www.win.tue.nl/math/dw/pp/berry/papers/crypto99.ps.gz

Wenbo Mao explains what "publically verifiable" or "universally
verifiable" means and why to use it:
http://www.hp.co.uk/people/wm/papers/oak98.ps

Rosario Gennaro's thesis on VSS:
http://citeseer.nj.nec.com/72839.html

Stinson's bibliography on secret sharing schemes:
http://www.cacr.math.uwaterloo.ca/~dstinson/ssbib.html

> 
> >and another is part of the Proactive Security work I
> >mentioned previously. 
> 
> On Byzantine Agreements?  I have run into references to the topic, but 
> it was never really clear what Byzantine Agreement really means.
> 

Actually, I meant that a verifiable secret sharing scheme is used in the
proactive security work. 

Thanks,
-David






More information about the cypherpunks-legacy mailing list