2019
DOI: 10.6028/nist.ir.8214
|View full text |Cite
|
Sign up to set email alerts
|

Threshold schemes for cryptographic primitives:

Abstract: The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL's responsibilities include the development of management, administrative, technical, and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 67 publications
0
6
0
Order By: Relevance
“…One cannot access the tokens and submit transactions without the requisite number of signatures from an m-of-n quorum of private keys. Multi-signature wallets can rely on threshold cryptography 5 [31] to compute the aggregate signature.…”
Section: Key Generationmentioning
confidence: 99%
See 1 more Smart Citation
“…One cannot access the tokens and submit transactions without the requisite number of signatures from an m-of-n quorum of private keys. Multi-signature wallets can rely on threshold cryptography 5 [31] to compute the aggregate signature.…”
Section: Key Generationmentioning
confidence: 99%
“…Once the computation is completed, the output is known by all of the nodes. Thus, secure multi-party computation allows multiple parties, often mutually distrustful, to compute some functionality of their inputs as if they were computed by a trusted third party[31] 10. Homomorphic encryption allows encrypted data to be processed without having to be decrypted beforehand.…”
mentioning
confidence: 99%
“…Threshold cryptographic schemes are generally encryption and decryption protocols where more than one party can contribute to the operation [28], hence named as MPA. Threshold cryptography can be highly advantageous in decentralized systems that require the approval of m out of n entities for the cryptographic operation to succeed, where m ≤ n, n is the total number of entities involved in the encryption operation and m is the required number of entities for the decryption operation.…”
Section: B Threshold Cryptography and Multi-party Authorizationmentioning
confidence: 99%
“…One cannot access the tokens and submit transactions without the requisite number of signatures from an m-of-n quorum of private keys. Multi-signature wallets can rely on threshold cryptography 5 [27] to compute the aggregate signature.…”
Section: Key Generationmentioning
confidence: 99%
“…Once the computation is completed, the output is known by all of the nodes. Thus, secure multi-party computation allows multiple parties, often mutually distrustful, to compute some functionality of their inputs as if they were computed by a trusted third party [27]. 9 Homomorphic encryption allows encrypted data to be processed without having to be decrypted beforehand.…”
Section: Confidential Smart Contractsmentioning
confidence: 99%