Research Article

Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing

Figure 3

Growth of memory consumption with and without SendWithCheck() subprotocol.