Abstract
In this paper we consider the secret reconstruction problem in a secret sharing scheme. We emphasize that a shared secret should be reconstructed in a fair way, i.e., all involved participants should have the same chance to be able to reconstruct the shared secret. We propose and analyze several methods to achieve such a fair reconstruction of shared secrets.
Similar content being viewed by others
References
D. Beaver and S. Goldwasser, Multiparty computation with faulty majority, FOCS89, pp. 468-473.
J. C. Benaloh and J. Leichter, Generalized secret sharing and monotone functions, CRYPTO'88, pp. 27-35.
G. R. Blakley, Safeguarding cryptographic keys, Proc. AFIPS 1979 Natl. Computer Conf., Vol. 48 (1979) pp. 313-317.
E. F. Brickell and D. R. Stinson, The detection of cheaters in threshold schemes, Crypto'88, pp. 564-577.
D. Chaum, I. Damgard, and J. van de Graaf, Multiparty computations ensuring privacy of each party's input and correctness of the result, CRYPTO'87, pp. 87-119.
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, FOCS 85, pp. 383-395.
S. Goldwasser and L. Levin, Fair computation of general functions in presence of immoral majority, CRYPTO'90, pp. 77-93.
M. Ito, A. Saito, and T. Nishizeki, Secret sharing scheme realizing general access structure, Proc. IEEE Global Telecommunications Conf., Globecom 87, Tokyo, Japan (1987) pp. 99-102.
T. Rabin, Robust sharing of secrets when the dealer is honest or cheating, Journal of ACM, Vol. 41, No.6 (1994) pp. 1089-1109.
T. Rabin and M. Ben-Or, Verifiable secret sharing and multiparty protocols with honest majority, STOC 89, pp. 73-85.
A. Renyi, Probability Theory, North-Holland Publishing Company, Amsterdam (1970).
A. Shamir, How to share a secret, CACM, Vol. 22, No.11 (1979) pp. 612-613.
T. Tedrick, How to exchange half a bit, Crypto'83, pp. 147-151.
T. Tedrick, Fair exchange of secrets, Crypto'84, pp. 434-438.
M. Tompa and H. Woll, How to share a secret with cheaters, Crypto'86, pp. 133-138.
A. Yao, How to generate and exchange secrets, FOCS, Vol. 86, pp. 162-167.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
He, J., Dawson, E. Shared Secret Reconstruction. Designs, Codes and Cryptography 14, 221–237 (1998). https://doi.org/10.1023/A:1008200702849
Issue Date:
DOI: https://doi.org/10.1023/A:1008200702849