Research Article
Binary Symmetric Polynomial-Based Protected Fair Secret Sharing and Secure Communication over Satellite Networks
Table 1
Comparison of fair secret sharing schemes.
| Scheme | Safe passage between participants | Completely fair | Security assumptions | Spoofing detection overhead | Cheater identification overhead |
| Reference [11] | No | No | No | | | Reference [16] | No | No | No | | | Reference [19] | No | No | No | | | Reference [15] | Yes | No | DLP | | No | Reference [22] | Yes | No | Yes | No | No | Our scheme | Yes | Yes | No | | |
|
|