Paper 2025/277
Tighter Control for Distributed Key Generation: Share Refreshing and Expressive Reconstruction Policies
Abstract
The secure management of private keys is a fundamental challenge, particularly for the general public, as losing these keys can result in irreversible asset loss. Traditional custodial approaches pose security risks, while decentralized secret sharing schemes offer a more resilient alternative by distributing trust among multiple parties. In this work, we extend an existing decentralized, verifiable, and extensible cryptographic key recovery scheme based on Shamir's secret sharing. We introduce a refresh phase that ensures proactive security, preventing long-term exposure of secret shares. Our approach explores three distinct methods for refreshing shares, analyzing and comparing their security guarantees and computational complexity. Additionally, we extend the protocol to support more complex access structures, with a particular focus on threshold access trees, enabling fine-grained control over key reconstruction.
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Preprint.
- Keywords
- secret sharingdecentralized key managementproactive securitythreshold access treesaccess policies
- Contact author(s)
-
sara montanari-1 @ unitn it
rlongo @ fbk eu
alessio meneghetti @ unitn it - History
- 2025-02-19: approved
- 2025-02-18: received
- See all versions
- Short URL
- https://ia.cr/2025/277
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/277, author = {Sara Montanari and Riccardo Longo and Alessio Meneghetti}, title = {Tighter Control for Distributed Key Generation: Share Refreshing and Expressive Reconstruction Policies}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/277}, year = {2025}, url = {https://eprint.iacr.org/2025/277} }