In the fourth part we introduce linear secret sharing schemes, and we show how one can check that the values sent to you are consistent, .i.e. the adversary is not lying.
No download links available.