@inproceedings{4d88a30843bb46ebb94f46924aa0f492,
title = "Dynamic threshold and cheater resistance for shamir secret sharing scheme",
abstract = "In this paper, we investigate the problem of increasing the threshold parameter of the Sharnir (t, n)-threshold scheme without interacting with the dealer. Our construction will reduce the problem of secret recovery to the polynomial reconstruction problem which can be solved using a recent algorithm by Guruswami and Sudan. In addition to be dealer-free, our protocol does not increase the communication cost between the dealer and the n participants when compared to the original (t, n)-threshold scheme. Despite an increase of the asymptotic time complexity at the combiner, we show that recovering the secret from the output of the previous polynomial reconstruction algorithm is still realistic even for large values of t. Furthermore the scheme does not require every share to be authenticated before being processed by the combiner. This will enable us to reduce the number of elements to be publicly known to recover the secret to one digest produced by a collision resistant hash function which is smaller than the requirements of most verifiable secret sharing schemes.",
author = "Christophe Tartary and Huaxiong Wang",
year = "2006",
language = "English",
isbn = "3540496084",
volume = "4318 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer, Springer Nature",
pages = "103--117",
editor = "Helger Lipmaa and Moti Yung and Dongdai Lin",
booktitle = "Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Proceedings",
address = "United States",
note = "2nd SKLOIS Conference on Information Security and Cryptology, Inscrypt 2006 ; Conference date: 29-11-2006 Through 01-12-2006",
}