Research Article

Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing

Table 1

Round complexities for secure VSS and WSS protocols with an active adversary.

ProtocolThresholdNumber of rounds

WSS—
3
1

VSS—
3
2
1