Skip to main content
Log in

Shared Secret Reconstruction

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

In this paper we consider the secret reconstruction problem in a secret sharing scheme. We emphasize that a shared secret should be reconstructed in a fair way, i.e., all involved participants should have the same chance to be able to reconstruct the shared secret. We propose and analyze several methods to achieve such a fair reconstruction of shared secrets.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. D. Beaver and S. Goldwasser, Multiparty computation with faulty majority, FOCS89, pp. 468-473.

  2. J. C. Benaloh and J. Leichter, Generalized secret sharing and monotone functions, CRYPTO'88, pp. 27-35.

  3. G. R. Blakley, Safeguarding cryptographic keys, Proc. AFIPS 1979 Natl. Computer Conf., Vol. 48 (1979) pp. 313-317.

    Google Scholar 

  4. E. F. Brickell and D. R. Stinson, The detection of cheaters in threshold schemes, Crypto'88, pp. 564-577.

  5. D. Chaum, I. Damgard, and J. van de Graaf, Multiparty computations ensuring privacy of each party's input and correctness of the result, CRYPTO'87, pp. 87-119.

  6. B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, FOCS 85, pp. 383-395.

  7. S. Goldwasser and L. Levin, Fair computation of general functions in presence of immoral majority, CRYPTO'90, pp. 77-93.

  8. M. Ito, A. Saito, and T. Nishizeki, Secret sharing scheme realizing general access structure, Proc. IEEE Global Telecommunications Conf., Globecom 87, Tokyo, Japan (1987) pp. 99-102.

  9. T. Rabin, Robust sharing of secrets when the dealer is honest or cheating, Journal of ACM, Vol. 41, No.6 (1994) pp. 1089-1109.

    Article  Google Scholar 

  10. T. Rabin and M. Ben-Or, Verifiable secret sharing and multiparty protocols with honest majority, STOC 89, pp. 73-85.

  11. A. Renyi, Probability Theory, North-Holland Publishing Company, Amsterdam (1970).

    Google Scholar 

  12. A. Shamir, How to share a secret, CACM, Vol. 22, No.11 (1979) pp. 612-613.

    Google Scholar 

  13. T. Tedrick, How to exchange half a bit, Crypto'83, pp. 147-151.

  14. T. Tedrick, Fair exchange of secrets, Crypto'84, pp. 434-438.

  15. M. Tompa and H. Woll, How to share a secret with cheaters, Crypto'86, pp. 133-138.

  16. A. Yao, How to generate and exchange secrets, FOCS, Vol. 86, pp. 162-167.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

He, J., Dawson, E. Shared Secret Reconstruction. Designs, Codes and Cryptography 14, 221–237 (1998). https://doi.org/10.1023/A:1008200702849

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1008200702849

Navigation