Research Article

Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing

Table 1

Round complexities for secure VSS and WSS protocols with an active adversary.

ProtocolThresholdNumber of rounds

WSSā€”
3
1

VSSā€”
3
2
1