{"id":"https://openalex.org/W4417248991","doi":"https://doi.org/10.1109/tit.2025.3642814","title":"Network-Agnostic Verifiable Secret Sharing With Cryptographic Security","display_name":"Network-Agnostic Verifiable Secret Sharing With Cryptographic Security","publication_year":2025,"publication_date":"2025-12-11","ids":{"openalex":"https://openalex.org/W4417248991","doi":"https://doi.org/10.1109/tit.2025.3642814"},"language":null,"primary_location":{"id":"doi:10.1109/tit.2025.3642814","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2025.3642814","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094267147","display_name":"Nidhish Bhimrajka","orcid":"https://orcid.org/0009-0000-8216-0988"},"institutions":[{"id":"https://openalex.org/I181514455","display_name":"International Institute of Information Technology Bangalore","ror":"https://ror.org/05h9eqy10","country_code":"IN","type":"education","lineage":["https://openalex.org/I181514455"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Nidhish Bhimrajka","raw_affiliation_strings":["Nidhish Bhimrajka and Supreeth Varadarajan were with IIIT Bangalore, Bengaluru, Singapore","Silence Laboratories Pte. Ltd, Students, IIIT Bangalore, India"],"affiliations":[{"raw_affiliation_string":"Nidhish Bhimrajka and Supreeth Varadarajan were with IIIT Bangalore, Bengaluru, Singapore","institution_ids":["https://openalex.org/I181514455"]},{"raw_affiliation_string":"Silence Laboratories Pte. Ltd, Students, IIIT Bangalore, India","institution_ids":["https://openalex.org/I181514455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040182958","display_name":"Ashish Choudhury","orcid":"https://orcid.org/0000-0002-2428-9537"},"institutions":[{"id":"https://openalex.org/I181514455","display_name":"International Institute of Information Technology Bangalore","ror":"https://ror.org/05h9eqy10","country_code":"IN","type":"education","lineage":["https://openalex.org/I181514455"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashish Choudhury","raw_affiliation_strings":["International Institute of Information Technology Bangalore, Bengaluru, India","International Institute of Information Technology, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"International Institute of Information Technology Bangalore, Bengaluru, India","institution_ids":["https://openalex.org/I181514455"]},{"raw_affiliation_string":"International Institute of Information Technology, Bangalore, India","institution_ids":["https://openalex.org/I181514455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003389015","display_name":"Supreeth Varadarajan","orcid":"https://orcid.org/0009-0001-2062-7076"},"institutions":[{"id":"https://openalex.org/I181514455","display_name":"International Institute of Information Technology Bangalore","ror":"https://ror.org/05h9eqy10","country_code":"IN","type":"education","lineage":["https://openalex.org/I181514455"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Supreeth Varadarajan","raw_affiliation_strings":["Nidhish Bhimrajka and Supreeth Varadarajan were with IIIT Bangalore, Bengaluru, Singapore","Silence Laboratories Pte. Ltd, Students, IIIT Bangalore, India"],"affiliations":[{"raw_affiliation_string":"Nidhish Bhimrajka and Supreeth Varadarajan were with IIIT Bangalore, Bengaluru, Singapore","institution_ids":["https://openalex.org/I181514455"]},{"raw_affiliation_string":"Silence Laboratories Pte. Ltd, Students, IIIT Bangalore, India","institution_ids":["https://openalex.org/I181514455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5094267147"],"corresponding_institution_ids":["https://openalex.org/I181514455"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2206726,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"2","first_page":"1332","last_page":"1363"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.663100004196167,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.663100004196167,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.07349999994039536,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.04729999974370003,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6651999950408936},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.583299994468689},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5788999795913696},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5508999824523926},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5443000197410583},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.5250999927520752},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5030999779701233},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.47839999198913574},{"id":"https://openalex.org/keywords/security-parameter","display_name":"Security parameter","score":0.4408000111579895},{"id":"https://openalex.org/keywords/universal-composability","display_name":"Universal composability","score":0.4108000099658966}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7225000262260437},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6651999950408936},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.583299994468689},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5788999795913696},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5698000192642212},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5508999824523926},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5443000197410583},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.5250999927520752},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5030999779701233},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4934000074863434},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.47839999198913574},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.4408000111579895},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.4108000099658966},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.39890000224113464},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.38989999890327454},{"id":"https://openalex.org/C13652956","wikidata":"https://www.wikidata.org/wiki/Q7444883","display_name":"Secure two-party computation","level":4,"score":0.38359999656677246},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3797999918460846},{"id":"https://openalex.org/C179145077","wikidata":"https://www.wikidata.org/wiki/Q5154130","display_name":"Communication complexity","level":2,"score":0.367000013589859},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34779998660087585},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.30820000171661377},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.30559998750686646},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.29600000381469727},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.2948000133037567},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.2937999963760376},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.29350000619888306},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.28940001130104065},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.28679999709129333},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.27730000019073486},{"id":"https://openalex.org/C91399829","wikidata":"https://www.wikidata.org/wiki/Q1115684","display_name":"Commitment scheme","level":3,"score":0.27300000190734863},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.26589998602867126},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.2651999890804291},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.26249998807907104},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.26019999384880066},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.2565999925136566},{"id":"https://openalex.org/C206149592","wikidata":"https://www.wikidata.org/wiki/Q3999882","display_name":"Trusted Network Connect","level":3,"score":0.25519999861717224}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2025.3642814","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2025.3642814","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W40166625","https://openalex.org/W136358653","https://openalex.org/W1245637661","https://openalex.org/W1499934958","https://openalex.org/W1524288918","https://openalex.org/W1547283663","https://openalex.org/W1827060200","https://openalex.org/W1885156594","https://openalex.org/W1965492831","https://openalex.org/W2006453614","https://openalex.org/W2033376960","https://openalex.org/W2034791526","https://openalex.org/W2036133214","https://openalex.org/W2054694168","https://openalex.org/W2138775315","https://openalex.org/W2141420453","https://openalex.org/W2168970529","https://openalex.org/W2277839617","https://openalex.org/W2528438932","https://openalex.org/W2911080704","https://openalex.org/W2970097841","https://openalex.org/W2990690033","https://openalex.org/W3037776643","https://openalex.org/W3115983221","https://openalex.org/W3141585064","https://openalex.org/W3204209583","https://openalex.org/W3212664445","https://openalex.org/W3216503967","https://openalex.org/W4286210688","https://openalex.org/W4286501318","https://openalex.org/W4317928282","https://openalex.org/W4360983526","https://openalex.org/W4378895375","https://openalex.org/W4385654456","https://openalex.org/W4389028143","https://openalex.org/W4389199327","https://openalex.org/W4395093951","https://openalex.org/W4411278306"],"related_works":[],"abstract_inverted_index":{"<italic":[0,23,36,48,58,97,146,161,170,191,207,215,250],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[1,24,37,49,59,98,147,162,171,192,208,216,251],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Verifiable":[2],"Secret-Sharing</i>":[3],"(VSS)":[4],"is":[5,107,142],"a":[6,15,20,65,113,205,258],"fundamental":[7],"primitive":[8],"in":[9,27,44,83,213,267],"secure":[10,206,272],"distributed":[11],"computing":[12],"that":[13],"allows":[14],"designated":[16],"dealer":[17],"to":[18,57,96,111,165,189],"share":[19],"secret":[21],"among":[22],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</i>":[25],"parties":[26,187],"the":[28,45,73,79,84,105,118,126,133,157,180,186,214,268],"presence":[29,46],"of":[30,39,47,132,135,195,270],"an":[31,226],"adversary":[32],"controlling":[33],"at":[34],"most":[35],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">t</i>":[38],"them.":[40],"We":[41,109],"study":[42],"VSS":[43,53,115,141,201],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">computationally-bounded</i>":[50],"adversaries.":[51],"Known":[52],"protocols":[54,255],"tolerate":[55,94],"up":[56,95],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">t<sub>s</sub></i>":[60],"<":[61,100],"n/2":[62],"corruptions":[63],"assuming":[64,225],"wellbehaved":[66],"synchronous":[67],"network":[68,74,90,106],"but":[69,92,185],"become":[70],"insecure":[71],"when":[72,104],"delay":[75],"becomes":[76],"unstable.":[77],"On":[78],"other":[80],"hand,":[81],"solutions":[82],"asynchronous":[85],"model":[86],"operate":[87],"under":[88],"arbitrary":[89],"conditions":[91,159,182],"only":[93],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">t<sub>a</sub></i>":[99],"n/3":[101],"corruptions,":[102],"even":[103],"well-behaved.":[108],"aim":[110],"build":[112],"networkagnostic":[114,273],"protocol":[116,124,212,234],"with":[117,145,169],"optimal":[119,167],"threshold":[120,158,181],"conditions.":[121],"A":[122],"network-agnostic":[123,140,241],"provides":[125],"best":[127],"possible":[128],"security":[129,149],"guarantees,":[130],"irrespective":[131],"type":[134],"underlying":[136],"communication":[137,237],"network.":[138],"Previously,":[139],"known":[143,164],"either":[144],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">perfect</i>":[148],"(Appan":[150,174],"et":[151,175],"al.":[152,176],"IEEE":[153],"IT":[154],"2023)":[155,178],"where":[156,179],"are":[160,183],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">not</i>":[163],"be":[166],"or":[168],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">statistical":[172],"security</i>":[173],"TCC":[177],"optimal,":[184],"need":[188],"perform":[190],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">exponential</i>":[193],"amount":[194],"computation":[196],"and":[197,275],"communication.":[198],"Using":[199],"our":[200,231],"protocol,":[202],"we":[203],"design":[204],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Multi-Party":[209],"Computation</i>":[210],"(MPC)":[211],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">plain":[217],"Public":[218],"Key":[219],"Infrastructure":[220],"(PKI)":[221],"model</i>,":[222],"i.e.,":[223],"without":[224],"expensive":[227],"trusted":[228],"setup.":[229],"Although":[230],"proposed":[232],"MPC":[233,242,254,274],"incurs":[235],"higher":[236],"complexity":[238],"than":[239],"state-of-the-art":[240],"protocols,":[243],"it":[244],"motivates":[245],"alternative":[246],"directions":[247],"for":[248],"designing":[249,280],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">computationally":[252],"inexpensive</i>":[253],"based":[256],"on":[257],"plain":[259],"PKI":[260],"setup,":[261],"which":[262],"has":[263],"not":[264],"been":[265],"explored":[266],"domain":[269],"computationally":[271],"offers":[276],"valuable":[277],"insights":[278],"into":[279],"it.":[281]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-11T00:00:00"}
