Paper 2010/207
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Koen Simoens, Roel Peeters, and Bart Preneel
Abstract
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these devices, the threshold
Note: Public key extraction phase of the DKG protocol was altered to a more efficient one
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- threshold cryptography
- Contact author(s)
- roel peeters @ esat kuleuven be
- History
- 2010-08-17: revised
- 2010-04-19: received
- See all versions
- Short URL
- https://ia.cr/2010/207
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/207, author = {Koen Simoens and Roel Peeters and Bart Preneel}, title = {Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/207}, year = {2010}, url = {https://eprint.iacr.org/2010/207} }