Threshold cryptography
- 1 July 1994
- journal article
- research article
- Published by Wiley in European Transactions on Telecommunications
- Vol. 5 (4) , 449-458
- https://doi.org/10.1002/ett.4460050407
Abstract
In the traditional scenario in cryptography there is one sender, one receiver and an active or passive eavesdropper who is an opponent. Large bank transactions require two people to sign, implying two senders. So the power to generate a valid transaction is shared. Threshold cryptography allows one to share the power of a cryptosystem. Threshold cryptosystems are distinct from threshold schemes in which the power to regenerate a secret key is shared. A normal threshold scheme is not directly suited for threshold signatures. Using a threshold scheme directly would require the shareholders to send their shares to a trusted person who would apply the cryptosystem for them. But the use of such a trusted person violates the main point of threshold cryptography. We motivate the need for treshold cryptosystems, overview the research in the field, and give some simple examples. We will conclude by giving a list of open problems.Keywords
This publication has 35 references indexed in Scilit:
- An almost-constant round interactive zero-knowledge proofInformation Processing Letters, 1992
- A digital multisignature scheme using bijective public-key cryptosystemsACM Transactions on Computer Systems, 1988
- Minimum disclosure proofs of knowledgeJournal of Computer and System Sciences, 1988
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Probabilistic algorithm for testing primalityJournal of Number Theory, 1980
- How to share a secretCommunications of the ACM, 1979
- INFLUENZA VACCINATION POLICYThe Lancet, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- A Fast Monte-Carlo Test for PrimalitySIAM Journal on Computing, 1977
- New directions in cryptographyIEEE Transactions on Information Theory, 1976