In this paper, we present the first Asynchronous Distributed Key Generation (ADKG) algorithm which is also the first distributed key generation algorithm that can generate cryptographic keys with a dual (f,2f+1)-threshold (where f is the number of faulty parties). As a result, using our ADKG we remove the trusted setup assumption that the most scalable consensus algorithms make. In order to create a DKG with a dual (f,2f+1)- threshold we first answer in the affirmative the open question posed by Cachin et al. [7] on how to create an Asynchronous Verifiable Secret Sharing (AVSS) protocol with a reconstruction threshold of f+1<k łe 2f+1, which is of independent interest. Our High-threshold-AVSS (HAVSS) uses an asymmetric bivariate polynomial ...
Distributed key generation is a main component of threshold cryptosystems and distributed cryptograp...
Threshold signatures are a crucial tool for many distributed protocols. As shown by Cachin, Kursawe,...
Abstract. We propose the first distributed discrete-log key generation (DLKG) protocol from scratch ...
Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems without a trust...
We give a protocol for Asynchronous Distributed Key Generation (A-DKG) that is optimally resilient (...
We give a protocol for Asynchronous Distributed Key Generation (A-DKG) that is optimally resilient (...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems without a trust...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
Distributed key generation (DKG) is widely used in multi-party computation and decentralized applica...
We present new protocols for threshold Schnorr signatures that work in an asynchronous communication...
International audienceThreshold cryptography is a fundamental distributed computational paradigm for...
Byzantine agreement requires a set of parties in a distributed system to agree on a value even if so...
Verifiable secret sharing is an important primitive in distributed cryptography. With the growing i...
The classical distributed key generation protocols (DKG) are resurging due to their widespread appli...
Distributed key generation is a main component of threshold cryptosystems and distributed cryptograp...
Threshold signatures are a crucial tool for many distributed protocols. As shown by Cachin, Kursawe,...
Abstract. We propose the first distributed discrete-log key generation (DLKG) protocol from scratch ...
Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems without a trust...
We give a protocol for Asynchronous Distributed Key Generation (A-DKG) that is optimally resilient (...
We give a protocol for Asynchronous Distributed Key Generation (A-DKG) that is optimally resilient (...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems without a trust...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
Distributed key generation (DKG) is widely used in multi-party computation and decentralized applica...
We present new protocols for threshold Schnorr signatures that work in an asynchronous communication...
International audienceThreshold cryptography is a fundamental distributed computational paradigm for...
Byzantine agreement requires a set of parties in a distributed system to agree on a value even if so...
Verifiable secret sharing is an important primitive in distributed cryptography. With the growing i...
The classical distributed key generation protocols (DKG) are resurging due to their widespread appli...
Distributed key generation is a main component of threshold cryptosystems and distributed cryptograp...
Threshold signatures are a crucial tool for many distributed protocols. As shown by Cachin, Kursawe,...
Abstract. We propose the first distributed discrete-log key generation (DLKG) protocol from scratch ...