ACKNOWLEDGMENT
We thank the anonymous reviewers for valuable com-
ments. The authors were supported by the EU H2020
project PRISMACLOUD.
REFERENCES
Akinyele, J. A., Garman, C., Miers, I., Pagano, M. W.,
Rushanan, M., Green, M., and Rubin, A. D. (2013).
Charm: a framework for rapidly prototyping cryp-
tosystems. Journal of Cryptographic Engineering.
Backes, M., Kate, A., and Patra, A. (2011). Computational
Verifiable Secret Sharing Revisited. In ASIACRYPT.
Bellare, M., Garay, J. A., and Rabin, T. (1996). Dis-
tributed Pseudo-Random Bit Generators - A New Way
to Speed-Up Shared Coin Tossing. In PODC.
Ben-Or, M., Goldwasser, S., and Wigderson, A. (1988).
Completeness Theorems for Non-Cryptographic
Fault-Tolerant Distributed Computation (Extended
Abstract). In STOC.
Blakley, G. R. (1979). Safeguarding cryptographic keys.
AFIPS National Computer Conference.
Cachin, C., Kursawe, K., Lysyanskaya, A., and Strobl, R.
(2002). Asynchronous Verifiable Secret Sharing and
Proactive Cryptosystems. In CCS.
Canetti, R. and Rabin, T. (1993). Fast Asynchronous
Byzantine Agreement with Optimal Resilience. In
STOC.
Chaum, D., Cr
´
epeau, C., and Damg
˚
ard, I. (1987). Mul-
tiparty unconditionally secure protocols (abstract).
CRYPTO.
Chor, B., Goldwasser, S., Micali, S., and Awerbuch, B.
(1985). Verifiable Secret Sharing and Achieving Si-
multaneity in the Presence of Faults (Extended Ab-
stract). FOCS.
Cramer, R., Damg
˚
ard, I., Dziembowski, S., Hirt, M., and
Rabin, T. (1999). Efficient Multiparty Computations
Secure Against an Adaptive Adversary. In EURO-
CRYPT.
Demirel, D., Krenn, S., Lor
¨
unser, T., and Traverso, G.
(2016). Efficient Third Party Auditing for a Dis-
tributed Storage System. In ARES.
Dolev, D., Dwork, C., Waarts, O., and Yung, M. (1993).
Perfectly Secure Message Transmission. Journal of
the ACM.
D’Souza, R., Jao, D., Mironov, I., and Pandey, O. (2011).
Publicly verifiable secret sharing for cloud-based key
management. INDOCRYPT.
Feldman, P. (1987). A Practical Scheme for Non-interactive
Verifiable Secret Sharing. In FOCS.
Fitzi, M., Garay, J. A., Gollakota, S., Rangan, C. P., and
Srinathan, K. (2006). Round-Optimal and Efficient
Verifiable Secret Sharing. In TCC.
Fujisaki, E. and Okamoto, T. (1998). A Practical and
Provably Secure Scheme for Publicly Verifiable Se-
cret Sharing and Its Applications. In EUROCRYPT.
Gennaro, R., Ishai, Y., Kushilevitz, E., and Rabin, T. (2001).
The Round Complexity of Verifiable Secret Sharing
and Secure Multicast. In STOC.
Gennaro, R., Jarecki, S., Krawczyk, H., and Rabin, T.
(2007). Secure distributed key generation for discrete-
log based cryptosystems. Journal of Cryptology.
Gennaro, R., Rabin, M. O., and Rabin, T. (1998). Simpli-
fied vss and fast-track multiparty computations with
applications to threshold cryptography. PODC.
gfshare (2010). gfshare.
http://manpages.ubuntu.com/manpages/
xenial/en/man7/gfshare.7.html. accessed: 2016-
12-14.
Happe, A., Krenn, S., and Lor
¨
unser, T. (2016). Malicious
Clients in Distributed Secret Sharing Based Storage
Networks. In SPW.
Herranz, J. and S
´
aez, G. (2003). Verifiable Secret Shar-
ing for General Access Structures, with Application
to Fully Distributed Proxy Signatures. In FC.
Jhanwar, M. P., Venkateswarlu, A., and Safavi-Naini,
R. (2014). Paillier-Based Publicly Verifiable (Non-
Interactive) Secret Sharing. Designs, Codes and Cryp-
tography.
Kate, A., Zaverucha, G. M., and Goldberg, I. (2010).
Constant-Size Commitments to Polynomials and Their
Applications.
Katz, J., Koo, C., and Kumaresan, R. (2008). Improving
the Round Complexity of VSS in Point-to-Point Net-
works. In ICALP (2).
Kaya, K. and Selc¸uk, A. A. (2008). A Verifiable Secret
Sharing Scheme Based on the Chinese Remainder
Theorem. In INDOCRYPT.
Krawczyk, H. (1993). Secret Sharing Made Short. In
CRYPTO.
Kumaresan, R., Patra, A., and Rangan, C. P. (2010). The
Round Complexity of Verifiable Secret Sharing: The
Statistical Case.
Lor
¨
unser, T., Happe, A., and Slamanig, D. (2015).
ARCHISTAR: Towards Secure and Robust Cloud
Based Data Sharing. In CloudCom ’15.
Naor, M. and Pinkas, B. (2001). Efficient Trace and Revoke
Schemes. FC.
Patra, A., Choudhary, A., Rabin, T., and Rangan, C. P.
(2009a). The Round Complexity of Verifiable Secret
Sharing Revisited.
Patra, A., Choudhary, A., and Rangan, C. P. (2009b). Sim-
ple and Efficient Asynchronous Byzantine Agreement
with Optimal Resilience. In PODC.
Pedersen, T. P. (1991). Non-Interactive and Information-
Theoretic Secure Verifiable Secret Sharing. CRYPTO.
Rabin, T. and Ben-Or, M. (1989). Verifiable secret sharing
and multiparty protocols with honest majority. STOC.
Schoenmakers, B. (1999). A Simple Publicly Verifiable Se-
cret Sharing Scheme and Its Application to Electronic.
In CRYPTO.
Shamir, A. (1979). How to Share a Secret. Communications
of the ACM.
Stadler, M. (1996). Publicly Verifiable Secret Sharing. In
EUROCRYPT.
ICISSP 2017 - 3rd International Conference on Information Systems Security and Privacy
310