Many personal devices are not suitable for threshold schemes, because they do not offer secure storage, which is needed to store shares of the private key. This article presents several protocols in which shares are stored in protected form (possibly externally). This makes them suitable for low-cost devices with a factory-embedded key, e.g., car keys and access cards. All protocols are verifiable through public broadcast, thus without private channels. In addition, distributed key generation does not require all devices to be present.
Category / Keywords: public-key cryptography / threshold cryptography Date: received 14 Apr 2010, last revised 17 Aug 2010 Contact author: roel peeters at esat kuleuven be Available formats: PDF | BibTeX Citation Note: Public key extraction phase of the DKG protocol was altered to a more efficient one Version: 20100817:091247 (All versions of this report) Discussion forum: Show discussion | Start new discussion