This paper presents a new construction of a lattice-based verifiable secret sharing scheme. Our proposal is based on lattices and the usage of linear hash functions to enable each participant to verify its received secret share. The security of this scheme relies on the hardness of some well known approximation problems in lattices such as n c-approximate SVP. Different to protocols proposed by Pedersen this scheme uses efficient matrix vector operations instead of exponentiation to verify the secret shares. © 2012 IFIP International Federation for Information Processing.
CITATION STYLE
El Bansarkhani, R., & Meziani, M. (2012). An efficient lattice-based secret sharing construction. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7322 LNCS, pp. 160–168). https://doi.org/10.1007/978-3-642-30955-7_14
Mendeley helps you to discover research relevant for your work.