{"id":"https://openalex.org/W2988763627","doi":"https://doi.org/10.1145/3319535.3354207","title":"Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols","display_name":"Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols","publication_year":2019,"publication_date":"2019-11-06","ids":{"openalex":"https://openalex.org/W2988763627","doi":"https://doi.org/10.1145/3319535.3354207","mag":"2988763627"},"language":"en","primary_location":{"id":"doi:10.1145/3319535.3354207","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3319535.3354207","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3319535.3354207","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3319535.3354207","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032583658","display_name":"Soumya Basu","orcid":"https://orcid.org/0000-0001-5237-1127"},"institutions":[{"id":"https://openalex.org/I205783295","display_name":"Cornell University","ror":"https://ror.org/05bnh6r87","country_code":"US","type":"education","lineage":["https://openalex.org/I205783295"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Soumya Basu","raw_affiliation_strings":["Cornell University &amp; IC3, Ithaca, NY, USA"],"affiliations":[{"raw_affiliation_string":"Cornell University &amp; IC3, Ithaca, NY, USA","institution_ids":["https://openalex.org/I205783295"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061386057","display_name":"Alin Tomescu","orcid":null},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alin Tomescu","raw_affiliation_strings":["Massachusetts Institute of Technology, Cambridge, MA, USA"],"affiliations":[{"raw_affiliation_string":"Massachusetts Institute of Technology, Cambridge, MA, USA","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078682514","display_name":"Ittai Abraham","orcid":"https://orcid.org/0000-0001-9568-7674"},"institutions":[{"id":"https://openalex.org/I4210093787","display_name":"Herzliya Medical Center","ror":"https://ror.org/00m6hsp80","country_code":"IL","type":"healthcare","lineage":["https://openalex.org/I4210093787"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Ittai Abraham","raw_affiliation_strings":["VMware Research, Herzliya, Israel"],"affiliations":[{"raw_affiliation_string":"VMware Research, Herzliya, Israel","institution_ids":["https://openalex.org/I4210093787"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038903572","display_name":"Dahlia Malkhi","orcid":"https://orcid.org/0000-0002-7038-7250"},"institutions":[{"id":"https://openalex.org/I4210140527","display_name":"California Institute for Biomedical Research","ror":"https://ror.org/04r28v857","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210140527"]},{"id":"https://openalex.org/I4210099336","display_name":"Menlo School","ror":"https://ror.org/01240pn49","country_code":"US","type":"education","lineage":["https://openalex.org/I4210099336"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dahlia Malkhi","raw_affiliation_strings":["Calibra, Menlo Park, CA, USA"],"affiliations":[{"raw_affiliation_string":"Calibra, Menlo Park, CA, USA","institution_ids":["https://openalex.org/I4210099336","https://openalex.org/I4210140527"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074117167","display_name":"Michael K. Reiter","orcid":"https://orcid.org/0000-0001-7007-8274"},"institutions":[{"id":"https://openalex.org/I74786994","display_name":"Kitware (United States)","ror":"https://ror.org/02s2acn37","country_code":"US","type":"company","lineage":["https://openalex.org/I74786994"]},{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael K. Reiter","raw_affiliation_strings":["University of North Carolina at Chapel Hill &amp; VMware Research, Chapel Hill, NC, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Chapel Hill &amp; VMware Research, Chapel Hill, NC, USA","institution_ids":["https://openalex.org/I74786994","https://openalex.org/I114027177"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043731494","display_name":"Emin G\u00fcn Sirer","orcid":null},"institutions":[{"id":"https://openalex.org/I205783295","display_name":"Cornell University","ror":"https://ror.org/05bnh6r87","country_code":"US","type":"education","lineage":["https://openalex.org/I205783295"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Emin G\u00fcn Sirer","raw_affiliation_strings":["Cornell University &amp; IC3, Ithaca, NY, USA"],"affiliations":[{"raw_affiliation_string":"Cornell University &amp; IC3, Ithaca, NY, USA","institution_ids":["https://openalex.org/I205783295"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5032583658"],"corresponding_institution_ids":["https://openalex.org/I205783295"],"apc_list":null,"apc_paid":null,"fwci":2.0426,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.88461198,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2387","last_page":"2402"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9718999862670898,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7791715860366821},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7553664445877075},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.6152386665344238},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5862360000610352},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5801659822463989},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5417088270187378},{"id":"https://openalex.org/keywords/replication","display_name":"Replication (statistics)","score":0.5385422110557556},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.5021109580993652},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.48938196897506714},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.43282458186149597},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.399338960647583},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.15253084897994995},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09965083003044128}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7791715860366821},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7553664445877075},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.6152386665344238},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5862360000610352},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5801659822463989},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5417088270187378},{"id":"https://openalex.org/C12590798","wikidata":"https://www.wikidata.org/wiki/Q3933199","display_name":"Replication (statistics)","level":2,"score":0.5385422110557556},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.5021109580993652},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.48938196897506714},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.43282458186149597},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.399338960647583},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.15253084897994995},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09965083003044128},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3319535.3354207","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3319535.3354207","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3319535.3354207","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3319535.3354207","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3319535.3354207","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3319535.3354207","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.46000000834465027,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G105238394","display_name":null,"funder_award_id":"DGE-1650441","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3447873124","display_name":null,"funder_award_id":"-1650441","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7031722743","display_name":null,"funder_award_id":"1650441","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G813645074","display_name":null,"funder_award_id":"DGE-165044","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2988763627.pdf","grobid_xml":"https://content.openalex.org/works/W2988763627.grobid-xml"},"referenced_works_count":52,"referenced_works":["https://openalex.org/W136358653","https://openalex.org/W1484422715","https://openalex.org/W1583834646","https://openalex.org/W1597987364","https://openalex.org/W1836078613","https://openalex.org/W1883290937","https://openalex.org/W1885156594","https://openalex.org/W1909324101","https://openalex.org/W1966383354","https://openalex.org/W1983762057","https://openalex.org/W1989431565","https://openalex.org/W1997820219","https://openalex.org/W2003214215","https://openalex.org/W2006699751","https://openalex.org/W2013686672","https://openalex.org/W2018562795","https://openalex.org/W2023930035","https://openalex.org/W2029416521","https://openalex.org/W2038345682","https://openalex.org/W2043007983","https://openalex.org/W2061462219","https://openalex.org/W2067410255","https://openalex.org/W2073126252","https://openalex.org/W2078049491","https://openalex.org/W2080975816","https://openalex.org/W2096024255","https://openalex.org/W2100265784","https://openalex.org/W2101939036","https://openalex.org/W2106004025","https://openalex.org/W2112717301","https://openalex.org/W2114579022","https://openalex.org/W2138775315","https://openalex.org/W2138784757","https://openalex.org/W2141420453","https://openalex.org/W2147243385","https://openalex.org/W2147270806","https://openalex.org/W2148129140","https://openalex.org/W2156591836","https://openalex.org/W2167497847","https://openalex.org/W2168970529","https://openalex.org/W2402235285","https://openalex.org/W2534313446","https://openalex.org/W2605103916","https://openalex.org/W2752830085","https://openalex.org/W2949206163","https://openalex.org/W2964159515","https://openalex.org/W2969395421","https://openalex.org/W3146996976","https://openalex.org/W3160893346","https://openalex.org/W4250314891","https://openalex.org/W4302440668","https://openalex.org/W6665124804"],"related_works":["https://openalex.org/W1557783852","https://openalex.org/W1474916271","https://openalex.org/W3088939963","https://openalex.org/W2357761884","https://openalex.org/W2111019861","https://openalex.org/W2356283120","https://openalex.org/W2363629235","https://openalex.org/W2611818227","https://openalex.org/W2388761115","https://openalex.org/W2081647269"],"abstract_inverted_index":{"Byzantine":[0,64],"fault":[1,65],"tolerant":[2,66],"state":[3,30,61,129],"machine":[4],"replication":[5,174,222],"(SMR)":[6],"provides":[7,105],"powerful":[8],"integrity":[9],"guarantees,":[10],"but":[11],"fails":[12],"to":[13,22,28,44,125,164],"provide":[14,136],"any":[15,167],"privacy":[16,25],"guarantee":[17],"whatsoever.":[18],"A":[19],"natural":[20],"way":[21],"add":[23],"such":[24,47],"guarantees":[26],"is":[27,97,119],"secret-share":[29],"instead":[31],"of":[32,84,122,155,169,226],"fully":[33],"replicating":[34],"it.":[35],"Such":[36],"a":[37,49,53,77,106,131,147,152,172,189,194,200,214,215],"com-":[38],"bination":[39],"would":[40,187],"enable":[41],"simple":[42],"solutions":[43],"difficult":[45],"problems,":[46],"as":[48,99],"fair":[50],"exchange":[51],"or":[52],"distributed":[54],"certification":[55],"authority.":[56],"However,":[57,92],"incorporating":[58],"secret":[59,88,127],"shared":[60,128,196],"into":[62,130,171,205],"traditional":[63],"(BFT)":[67],"SMR":[68],"protocols":[69,74,186],"presents":[70],"unique":[71],"challenges.":[72],"BFT":[73,103,132,173,206,221],"often":[75],"use":[76],"network":[78],"model":[79],"that":[80],"has":[81],"some":[82],"degree":[83],"asynchrony,":[85],"making":[86],"verifiable":[87],"sharing":[89,149],"(VSS)":[90],"unsuitable.":[91],"full":[93],"asynchronous":[94],"VSS":[95,113,139],"(AVSS)":[96],"unnecessary":[98],"well":[100],"since":[101],"the":[102,112,120,137],"algorithm":[104],"broadcast":[107],"channel.":[108],"We":[109,208],"first":[110,138],"present":[111,232],"with":[114,140,183],"share":[115,141],"recovery":[116,142],"problem,":[117],"which":[118,146],"subproblem":[121],"AVSS":[123,185],"required":[124],"incorporate":[126],"engine.":[133],"Then,":[134],"we":[135,161],"solution,":[143],"KZG-VSSR,":[144],"in":[145],"failure-free":[148],"incurs":[150],"only":[151,178],"constant":[153,179],"number":[154],"cryptographic":[156],"operations":[157],"per":[158],"replica.":[159],"Finally,":[160],"show":[162],"how":[163],"efficiently":[165],"integrate":[166],"instantiation":[168],"VSSR":[170,182],"protocol":[175],"while":[176],"incurring":[177],"overhead.":[180],"Instantiating":[181],"prior":[184],"require":[188],"quadratic":[190],"communication":[191],"cost":[192],"for":[193],"single":[195],"value":[197],"and":[198,223,229,231],"incur":[199],"linear":[201],"overhead":[202],"when":[203],"incorporated":[204],"replication.":[207],"demonstrate":[209],"our":[210],"end-to-end":[211],"solution":[212],"via":[213],"private":[216],"key-value":[217],"store":[218],"built":[219],"using":[220],"two":[224],"instantiations":[225],"VSSR,":[227],"KZG-VSSR":[228],"Ped-VSSR,":[230],"its":[233],"evaluation.":[234]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
