9 releases

Uses new Rust 2021

0.2.6 Mar 4, 2022
0.2.5 Jul 14, 2021
0.2.4 Mar 25, 2021
0.2.0 Feb 28, 2021
0.0.4 Jan 16, 2021

#331 in Cryptography


1.5K SLoC

MPVSS - A Simple Publicly Verifiable Secret Sharing Library

CI crates.io Crates.io

The library implements a simple PVSS scheme in Rust.

What is PVSS?

Secret sharing means a dealer can break a secret into secret shares among a group of participants which can reconstruct the secret only by collaboratively joining their parts of the secret. The library also implements threshold cryptography so that the dealer can decide whether all of the receiving participants need to collaborate or if a smaller subgroup of participants is sufficient to reconstruct the secret.

In addition to the plain secret sharing scheme PVSS adds verifiability in the following way: All the parts the secret is split into are encrypted with the receivers' public keys respectively. The dealer publishes all the encrypted shares along with a non-interactive zero-knowledge proof that allows everbody (not only the receiving participants) to verify that the decrypted shares indeed can be used to reconstruct the secret. The participants then decrypt all their shares and exchange them along with another non-interactive zero-knowledge proof that allows the receiving participant to verify that the share is actually the result of the decryption.

Thus PVSS can be used to share a secret among a group of participants so that either the secret can be reconstructed by the participants who all play fair or a participant that received a faked share can identify the malicious party.


cargo build --release


cargo test --release


cargo run --release --example mpvss_all
cargo run --release --example mpvss_sub



At first we convert our secret message into a numeric value if necessary. When creating the dealer a PVSS instance is created as well which holds all the global parameters that every participant needs to know.

let secret_message = String::from("Hello MPVSS.");

let mut dealer = Participant::new();

let mut p1 = Participant::new();
let mut p2 = Participant::new();
let mut p3 = Participant::new();


Distribution & Verification

The dealer splits the secret into shares, encrypts them and creates a proof so that everybody can verify that the shares (once decrypted) can be used to reconstruct the secret. The threshold determines how many shares are necessary for the reconstruction. The encrypted shares and the proof are then bundled together.

// Dealer that shares the secret among p1, p2 and p3.
let distribute_shares_box = dealer.distribute_secret(
        &vec![p1.publickey, p2.publickey, p3.publickey],

// p1 verifies distribution shares box containing encryted shares and proof of zero-knowlege. [p2 and p3 do this as well.]

Exchange & Verification

The participants extract their shares from the distribution shares box and decrypt them. They bundle them together with a proof that allows the receiver to verify that the share is indeed the result of the decryption.

// p1 extracts the share. [p2 and p3 do this as well.]
let s1 = p1
    .extract_secret_share(&distribute_shares_box, &p1.privatekey)

// p1, p2 and p3 exchange their descrypted shares.
// ...
let s2 = p2
    .extract_secret_share(&distribute_shares_box, &p2.privatekey)
let s3 = p3
    .extract_secret_share(&distribute_shares_box, &p3.privatekey)

// p1 verifies the share received from p2. [Actually everybody verifies every received share.]
    p1.verify_share(&s2, &distribute_shares_box, &p2.publickey),
    p2.verify_share(&s3, &distribute_shares_box, &p3.publickey),
    p3.verify_share(&s1, &distribute_shares_box, &s1.publickey),


Once a participant collected at least threshold shares the secret can be reconstructed.

let share_boxs = [s1, s2, s3];
let r1 = p1
    .reconstruct(&share_boxs, &distribute_shares_box)
let r2 = p2
    .reconstruct(&share_boxs, &distribute_shares_box)
let r3 = p3
    .reconstruct(&share_boxs, &distribute_shares_box)

let r1_str = string_from_secret(&r1);
assert_eq!(secret_message.clone(), r1_str);
let r2_str = string_from_secret(&r2);
assert_eq!(secret_message.clone(), r2_str);
let r3_str = string_from_secret(&r3);
assert_eq!(secret_message.clone(), r3_str);

In the futures

Add more Elliptic Curves groups.

Because the ploynomial commitments does not Pedersen commitment and DLEQ is only computaional secure, not information-theoretic secure in this project.


Dual-licensed to be compatible with the Rust project.

Licensed under the Apache License, Version 2.0 http://www.apache.org/licenses/LICENSE-2.0 or the MIT license http://opensource.org/licenses/MIT, at your option. This file may not be copied, modified, or distributed except according to those terms.


~58K SLoC