In cryptography, a secret sharing scheme is publicly verifiable (PVSS) if it is a verifiable secret sharing scheme and if any party (not just the participants of the protocol) can verify the validity of the shares distributed by the dealer.
The method introduced here according to the paper by Chunming Tang, Dingyi Pei, Zhuo Liu, and Yong He is non-interactive and maintains this property throughout the protocol.
The PVSS scheme dictates an initialization process in which:
Excluding the initialization process, the PVSS consists of two phases:
1. Distribution of secret
s
D
s1,s2...sn
P1,P2...Pn
Ei(si)
Pi
proofD
Ei
si
proofD
s
2. Verification of the shares:
Ei
1. Decryption of the shares:
Pi
si
Ei(si)
Ei(si)
si
si
proof | |
Pi |
2. Pooling the shares:
proof | |
Pi |
Ei(si)
s
A proposed protocol proving:
log | |
g1 |
h1=
log | |
g2 |
h2
r\in
\boldsymbol{\Zeta} | |
q* |
c\inR\boldsymbol{\Zeta}q
s=r-cx(modq)
\alpha1=
s | |
g | |
1 |
c | |
h | |
1 |
\alpha2=
s | |
g | |
2 |
c | |
h | |
2 |
Denote this protocol as:
dleq(g1,h1,g2,h2)
dleq(g1,h1,g2,h2)
dleq(X,Y,g1,h1,g2,h2)
X=
x1 | |
g | |
1 |
x2 | |
g | |
2 |
Y=
x1 | |
h | |
1 |
x2 | |
h | |
2 |
r1,r2\in
* | |
Z | |
q |
t1=
r1 | |
g | |
1 |
r2 | |
g | |
2 |
t2=
r1 | |
h | |
1 |
r2 | |
h | |
2 |
c\inR\boldsymbol{\Zeta}q
s1=r1-cx1(modq)
s2=r2-cx2(modq)
t1=Xc
s1 | |
g | |
1 |
s2 | |
g | |
2 |
t2=Yc
s1 | |
h | |
1 |
s2 | |
h | |
2 |
The Chaum-Pedersen protocol is an interactive method and needs some modification to be used in a non-interactive way:Replacing the randomly chosen
c
m