Publicly Verifiable Secret Sharing: Generic Constructions and Lattice-Based Instantiations in the Standard Model

📅 2025-04-19
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Existing public-key verifiable secret sharing (PVSS) schemes either rely on the random oracle model or rest on classical cryptographic assumptions—such as RSA or discrete logarithm—that are vulnerable to quantum attacks. Method: We present the first post-quantum secure PVSS scheme in the standard model, built solely upon the Learning With Errors (LWE) assumption. Our construction supports secret reconstruction by any qualified subset of participants and enables publicly verifiable correctness of both sharing and reconstruction by arbitrary third parties. It integrates lattice-based zero-knowledge proofs, hiding commitments, and polynomial interpolation techniques to achieve provable security and asymptotic efficiency. Contribution/Results: This is the first PVSS scheme simultaneously achieving standard-model security, quantum resistance, and practical verifiability. It is suitable for applications including electronic voting and distributed key generation.

Technology Category

Application Category

📝 Abstract
Publicly verifiable secret sharing (PVSS) allows a dealer to share a secret among a set of shareholders so that the secret can be reconstructed later from any set of qualified participants. In addition, any public verifier should be able to check the correctness of the sharing and reconstruction process. PVSS has been demonstrated to yield various applications, such as e-voting, distributed key generation, decentralized random number generation protocols, and multi-party computation. Although many concrete PVSS protocols have been proposed, their security is either proven in the random oracle model or relies on quantum-vulnerable assumptions such as factoring or discrete logarithm. In this work, we put forward a generic construction for PVSS that can be instantiated in the standard model under the Learning With Errors (LWE) assumption. Our instantiation provides the first post-quantum PVSS in the standard model, with a reasonable level of asymptotic efficiency.
Problem

Research questions and friction points this paper is trying to address.

Publicly verifiable secret sharing in standard model
Post-quantum security under LWE assumption
Generic construction for diverse applications
Innovation

Methods, ideas, or system contributions that make the work stand out.

Generic PVSS construction in standard model
Lattice-based instantiation under LWE assumption
First post-quantum PVSS with asymptotic efficiency
🔎 Similar Papers
No similar papers found.
P
Pham Nhat Minh
Department of Computer Science, Faculty of Computer Science and Engineering, 268 Ly Thuong Kiet Street, District 10, Ho Chi Minh City, 740500, Vietnam; Vietnam National University Ho Chi Minh City, Linh Trung Ward, Thu Duc City, Ho Chi Minh City, 721400, Vietnam
Khoa Nguyen
Khoa Nguyen
University of Wollongong, Australia
Cryptography
W
Willy Susilo
Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, NSW 2500, Australia
Khuong Nguyen-An
Khuong Nguyen-An
Faculty of Computer Science and Engineering, University of Technology (HCMUT), VNU-HCM, Vietnam
CryptographyBlockchain TechnologyCybersecurityApplied Machine LearningData Analytics