Numerous cryptographic applications require a trusted authority to hold a secret. With a plethora of malicious attacks over the Internet, however, it is difficult to establish and maintain such an authority in online systems. Secret-sharing schemes attempt to solve this problem by distributing the required trust to hold and use the secret over multiple servers; however, they still require a trusted {\em dealer} to choose and share the secret, and have problems related to single points of failure and key escrow. A distributed key generation (DKG) scheme overcomes these hurdles by removing the requirement of a dealer in secret sharing. A (threshold) DKG scheme achieves this using a complete distribution of the trust among a number of serve...
International audienceThreshold cryptography is a fundamental distributed computational paradigm for...
We present a new distributed, group ElGamal public key generation algorithm which also permits maint...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
Distributed key generation (DKG) is widely used in multi-party computation and decentralized applica...
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted mes...
The classical distributed key generation protocols (DKG) are resurging due to their widespread appli...
A Key Distribution Center of a network is a server who generates anddistributes secret keys to group...
Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems without a trust...
We present a non-interactive publicly verifiable secret sharing scheme where a dealer can construct ...
Many threshold systems require some kind of secret sharing during their set-up phase. There has been...
Distributed key generation is a main component of threshold cryptosystems and distributed cryptograp...
Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems without a trust...
In this paper, we present the first Asynchronous Distributed Key Generation (ADKG) algorithm which i...
In the second chapter, the notion of a social secret sharing (SSS) scheme is introduced in which sha...
International audienceThreshold cryptography is a fundamental distributed computational paradigm for...
We present a new distributed, group ElGamal public key generation algorithm which also permits maint...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
Distributed key generation (DKG) is widely used in multi-party computation and decentralized applica...
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted mes...
The classical distributed key generation protocols (DKG) are resurging due to their widespread appli...
A Key Distribution Center of a network is a server who generates anddistributes secret keys to group...
Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems without a trust...
We present a non-interactive publicly verifiable secret sharing scheme where a dealer can construct ...
Many threshold systems require some kind of secret sharing during their set-up phase. There has been...
Distributed key generation is a main component of threshold cryptosystems and distributed cryptograp...
Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems without a trust...
In this paper, we present the first Asynchronous Distributed Key Generation (ADKG) algorithm which i...
In the second chapter, the notion of a social secret sharing (SSS) scheme is introduced in which sha...
International audienceThreshold cryptography is a fundamental distributed computational paradigm for...
We present a new distributed, group ElGamal public key generation algorithm which also permits maint...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...