Distributed key generation is a main component of threshold cryptosystems and distributed cryptographic computing in general. Solutions to the distributed generation of private keys for discrete-log based cryptosystems have been known for several years and used in a variety of protocols and in many research papers. However, these solutions fail to provide the full security required and claimed by these works. We show how an active attacker controlling a small number of parties can bias the values of the generated keys, thus violating basic correctness and secrecy requirements of a key generation protocol. In particular, our attacks point out to the places where the proofs of security fail. Based on these findings we designed a distributed k...
In this paper, we present the first Asynchronous Distributed Key Generation (ADKG) algorithm which i...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhancing t...
In a distributed key distribution scheme, a set of servers help a set of users in a group to securel...
International audiencePedersen designed the first scheme for generating Discrete-Log keys without an...
Abstract Generating a distributed key, where a constant fraction of the players can reconstruct the ...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
Abstract. We propose the first distributed discrete-log key generation (DLKG) protocol from scratch ...
Abstract.We introduce the notion of distributed password-based public-key cryptography, where a virt...
International audienceThreshold cryptography is a fundamental distributed computational paradigm for...
A threshold signature or decryption scheme is a distributed implementation of a cryptosys-tem, in wh...
In [16], Naor, Pinkas and Reingold introduced schemes in which some groups of servers distribute key...
Abstract. This paper addresses the security and efficiency of key-evol-ving protocols. We identify f...
Abstract — In a distributed key distribution scheme, a set of servers help a set of users in a group...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhanc-ing ...
Emerging applications like electronic commerce and secure communications over open networks have mad...
In this paper, we present the first Asynchronous Distributed Key Generation (ADKG) algorithm which i...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhancing t...
In a distributed key distribution scheme, a set of servers help a set of users in a group to securel...
International audiencePedersen designed the first scheme for generating Discrete-Log keys without an...
Abstract Generating a distributed key, where a constant fraction of the players can reconstruct the ...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
Abstract. We propose the first distributed discrete-log key generation (DLKG) protocol from scratch ...
Abstract.We introduce the notion of distributed password-based public-key cryptography, where a virt...
International audienceThreshold cryptography is a fundamental distributed computational paradigm for...
A threshold signature or decryption scheme is a distributed implementation of a cryptosys-tem, in wh...
In [16], Naor, Pinkas and Reingold introduced schemes in which some groups of servers distribute key...
Abstract. This paper addresses the security and efficiency of key-evol-ving protocols. We identify f...
Abstract — In a distributed key distribution scheme, a set of servers help a set of users in a group...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhanc-ing ...
Emerging applications like electronic commerce and secure communications over open networks have mad...
In this paper, we present the first Asynchronous Distributed Key Generation (ADKG) algorithm which i...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhancing t...
In a distributed key distribution scheme, a set of servers help a set of users in a group to securel...