On Sat, 13 Jan 2001, Ray Dillinger wrote:
> >No central server now, just needs a verifiable secret sharing scheme.
> >Pedersen has one,
>
> Cite, or URL? A verifiable secret sharing protocol could solve a *LOT*
> of protocol problems and I want to read it closely. (Thanks in advance
> for any pointers...)
Pedersen's verifiable secret sharing:
Non-interactive and information-theoretic secure verifiable secret
sharing. In J. Feigenbaum, editor, Advances in Cryptology -- CRYPTO '91,
volume 576 of Lecture Notes in Computer Science, pages 129-140, 11-15
August 1991. Springer-Verlag, 1992
Stadler's publically verifiable secret sharing:
http://citeseer.nj.nec.com/stadler96publicly.html
Schoenmakers' publically verifiable secret sharing:
http://www.win.tue.nl/math/dw/pp/berry/papers/crypto99.ps.gz
Wenbo Mao explains what "publically verifiable" or "universally
verifiable" means and why to use it:
http://www.hp.co.uk/people/wm/papers/oak98.ps
Rosario Gennaro's thesis on VSS:
http://citeseer.nj.nec.com/72839.html
Stinson's bibliography on secret sharing schemes:
http://www.cacr.math.uwaterloo.ca/~dstinson/ssbib.html
>
> >and another is part of the Proactive Security work I
> >mentioned previously.
>
> On Byzantine Agreements? I have run into references to the topic, but
> it was never really clear what Byzantine Agreement really means.
>
Actually, I meant that a verifiable secret sharing scheme is used in the
proactive security work.
Thanks,
-David