1

Consider a protocol $\pi$ which uses a linear secret sharing scheme like that of Shamir secret sharing. Further assume that the protocol $\pi$ has been proven to be secure (correctness and privacy) under the semi-honest adversarial model. If we replace the secret sharing scheme with a verifiable secret sharing scheme, will the protocol $\pi$ then be secure even under the malicious adversarial model? That is, can we say that the robustness of $\pi$ is implicit? If yes, please provide a reference. If no, please help me understand as to in which cases will the above not be true.

sun
  • 540
  • 2
  • 12

0 Answers0