\relax 
\citation{Zhou:2005:APS:1085126.1085127}
\citation{Zhou:2005:APS:1085126.1085127}
\citation{Shamir79}
\citation{Ito87}
\citation{Pedersen91}
\citation{Zhou:2005:APS:1085126.1085127}
\citation{Pedersen91}
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{1}}
\@writefile{toc}{\contentsline {section}{\numberline {2}Background}{1}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1}Secret Sharing}{1}}
\citation{Ito87}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2}Subsharings}{2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3}Asynchronous Communication}{2}}
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Verifiable Secret Sharing Scheme}}{3}}
\newlabel{alg}{{1}{3}}
\citation{Zhou:2005:APS:1085126.1085127}
\citation{Zhou:2005:APS:1085126.1085127}
\@writefile{toc}{\contentsline {section}{\numberline {3}Contributions}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Theoretical}{4}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.1}Exponential Share Expansion}{4}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.2}Multiple Initial Sharings}{4}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.3}Private Keys}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2}Practical}{4}}
\@writefile{toc}{\contentsline {section}{\numberline {4}Design}{5}}
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Server Process Flow Chart}}{5}}
\newlabel{fig:fig3}{{2}{5}}
\citation{Zhou:2005:APS:1085126.1085127}
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Server Process Flow Chart}}{6}}
\newlabel{fig:fig4}{{3}{6}}
\@writefile{toc}{\contentsline {section}{\numberline {5}Implementation}{6}}
\newlabel{impl}{{5}{6}}
\newlabel{impl}{{5}{6}}
\citation{ds-final-project}
\citation{Zhou:2005:APS:1085126.1085127}
\citation{Pedersen91}
\citation{Zhou:2005:APS:1085126.1085127}
\citation{RSA}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Verifiable Secret Sharing Scheme}{7}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}Hybrid Cryptosystem}{7}}
\citation{axis2}
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces $l:l$ Secret Sharing Scheme}}{8}}
\newlabel{fig:fig2}{{4}{8}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3}Standalone Deployment}{8}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4}Distributed Deployment}{9}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.5}Experiments}{10}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.6}Unit Tests}{11}}
\@writefile{toc}{\contentsline {section}{\numberline {6}Experiments}{11}}
\newlabel{exp}{{6}{11}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1}Normal Operation}{11}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2}Byzantine Server}{12}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.1}Altered Messages}{12}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.2.2}Dropped Messages}{12}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3}Dynamic Adversary}{12}}
\citation{Zhou:2005:APS:1085126.1085127}
\citation{ds-final-project}
\bibstyle{unsrt}
\bibdata{report}
\bibcite{Zhou:2005:APS:1085126.1085127}{1}
\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Share Refreshing Performance}}{13}}
\newlabel{table_share_perf}{{1}{13}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4}Performance Tests}{13}}
\@writefile{toc}{\contentsline {section}{\numberline {7}Conclusion}{13}}
\newlabel{con}{{7}{13}}
\bibcite{Shamir79}{2}
\bibcite{Ito87}{3}
\bibcite{Pedersen91}{4}
\bibcite{ds-final-project}{5}
\bibcite{RSA}{6}
\bibcite{axis2}{7}
