Research Article

Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing

Figure 2

Growth of runtime with and without SendWithCheck() subprotocol.