\section{Conclusion}
\label{con}

We proposed to implement the asynchronous proactive verifiable secret sharing 
scheme defined in\cite{Zhou:2005:APS:1085126.1085127}. We first identified 
several drawbacks of the original scheme and we implemented the verifiable 
secret sharing scheme, while developing all constructs from from scratch.

We developed two testbeds, first to simulate and debug the secret sharing scheme
and then to deploy the distributed secret sharing scheme for further experiments.
The results of our experiments clearly demonstrates the correct implementation 
of the verifiable secret sharing scheme, the provisions for asynchronous 
communication, and proves that the scheme is successful against a dynamic 
adversary.

The project artifacts (source code and documents) are hosted at \cite{ds-final-project}.

