@inproceedings{b463ea4b9aa14506ad8eda6dd11d3e63,
title = "Verifiable secret sharing and time capsules",
abstract = "The paper considers verifiable Shamir secret sharing and presents three schemes. The first scheme allows to validate secrets recovered. The second construction adds the cheater identification feature also called the share validation capability. The third scheme permits to share multiple secrets with secret validation. The constructions are based on hashing and for security evaluation, hashing is modelled as a random oracle with public description. We discuss an application of verifiable secret sharing for the design of cryptographic time capsules for time-release crypto.",
author = "Josef Pieprzyk and Eiji Okamoto",
year = "2000",
doi = "10.1007/10719994_14",
language = "English",
isbn = "3540673806",
volume = "1787",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer, Springer Nature",
pages = "169--183",
booktitle = "Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings",
address = "United States",
note = "2nd International Conference on Information Security and Cryptology, ICISC 1999 ; Conference date: 09-12-1999 Through 10-12-1999",
}