Proof 2. According to our discussion presented in sec-
tion 4.1, each shareholder can conclude that the de-
gree of master polynomial F(x) =
∑
n
w=1
f
w
(x) is at
most (t − 1) if our proposed (n, t, n)-VSS is success-
fully completed. This result is the same as Peder-
sen’s (t, n)-VSS. As long as the degree of the sub-
polynomial selected by the shareholder is exactly
(t − 1), this shareholder can therefore be convinced
that, the degree of the master polynomial F(x) must
be exactly (t − 1) due to linear property of polynomi-
als.
Remark 3. Our proposed (n, t, n)-VSS is almost the
same as Pedersen’s (n,t, n)-VSS. However, the main
difference between our proposed scheme and the Ped-
ersen’s scheme is that it requires each dealer (share-
holder) must pick random polynomials with degree
exactly (t − 1) in our scheme; but polynomials with
degree at most (t − 1) in Pedersen’s scheme. With
this difference, our scheme is a strong (n, t, n)-VSS;
but Pedersen’s scheme is not a strong (n, t, n)-VSS.
Pedersen’s scheme can only ensure that all shares are
t-consistent; but all shares may not satisfy the security
requirements of a secret sharing scheme. Our pro-
posed (n, t, n)-VSS can ensure that (a) all shares are
t-consistent, and (b) all shares satisfy the security re-
quirements of a secret sharing scheme.
5 CONCLUSIONS
In this paper, we first show that VSS schemes pro-
posed by Pedersen can only ensure that shares are
t-consistent, but shares may not satisfy the security
requirements of secret sharing scheme. Then, we in-
troduce a new notion of strong VSS. A strong VSS
scheme can ensure that (a) all shares are t-consistent
and (b) all shares satisfy the security requirements
of secret sharing scheme. Based on Pedersen’s VSS
schemes, we propose two VSS schemes, (t, n)-VSS
and (n, t, n)-VSS, which are information-theoretically
secure. We also provethat our proposed VSS schemes
satisfy the strong verifiable property.
REFERENCES
Benaloh, J. C. (1986). Secret sharing homomorphisms:
Keeping shares of a secret secret. In Proc. Crypto’86,
volume 263 of LNCS, pages 251–260. Springer-
Verlag.
Blakley, G. R. (1979). Safeguarding cryptographic keys. In
Proc. Nat. Computer Conf., volume 48, pages 313–
317. AFIPS Press.
Cachin, C., Kursawe, K., Lysyanskaya, A., and Strobl, R.
(2002). Asynchronous verifiable secret sharing and
proactive cryptosystems. In Proc. 9th ACM Conf.
Computer and Communications Security, pages 88–
97. ACM Press.
Cachin, C., Kursawe, K., and Shoup, V. (2005). Ran-
dom oracles in constantinople: practical asynchronous
byzantine agreement using cryptography. J. Cryptol-
ogy, 8(3):219–246.
Chor, B., Goldwasser, S., Micali, S., and Awerbuch, B.
(1985). Verifiable secret sharing and achieving simul-
taneously in the presence of faults. In Proc. 26th IEEE
Symp. on Foundations of Computer Science, pages
383–395. IEEE Society.
Cramer, R., Damg˚ard, I., and Maurer, U. (2000). Verifi-
able secret sharing and achieving simultaneously in
the presence of faults. In Proc. Eurocrypt’00, volume
1807 of LNCS, pages 316–334. Springer-Verlag.
Dehkordi, M. H. and Mashhadi, S. (2008). New efficient
and practical verifiable multi-secret sharing schemes.
Information Sciences, 178(9):2262–2274.
Feldman, P. (1987). A practical scheme for non-interactive
verifiable secret sharing. In Proc. 28th IEEE Symp.
on Foundations of Computer Science, pages 427–437.
IEEE Society.
Housley, R., Polk, W., Ford, W., and Solo, D. (2002). Inter-
net x.509 public key infrastructure certificate and cer-
tificate revocation list (crl) profile. rfc3280, ietf. Avail-
able: http://www.ipa.go.jp/security/rfc/RFC3280-
00EN.html.
Ingemarsson, I. and Simmons, G. J. (1991). A protocol to
set up shared secret schemes without the assistance of
a mutualy trusted party. In Proc. Eurocrypt’90, vol-
ume 472 of LNCS, pages 266–282. Springer-Verlag.
Katz, J., Koo, C., and Kumaresan, R. (2008). Improved the
round complexity of vss in point-to-point networks.
In Proc. ICALP 2008, Part II, volume 5126 of LNCS,
pages 499–510. Springer-Verlag.
Ma, C. and Cheng, R. (2008). Key management based
on hierarchical secret sharing in ad-hoc networks. In
Proc. Inscrypt 2007, volume 4990 of LNCS, pages
182–191. Springer-Verlag.
Pedersen, T. P. (1992). Non-interactive and information-
theoretic secure verfiable secret sharing. In Proc.
Crypto’91, volume 576 of LNCS, pages 129–140.
Springer-Verlag.
Shamir, A. (1979). How to share a secret. Commun. ACM,
22(11):612–613.
Zhou, L. and Haas, Z. J. (1999). Securing ad hoc networks.
IEEE Networks Magazine, 13(6):24–30.
SECRYPT 2009 - International Conference on Security and Cryptography
238