THRESHOLD CRYPTOGRAPHY

Authors
Citation
Yg. Desmedt, THRESHOLD CRYPTOGRAPHY, European transactions on telecommunications and related technologies, 5(4), 1994, pp. 449-457
Citations number
NO
Categorie Soggetti
Telecommunications
ISSN journal
11203862
Volume
5
Issue
4
Year of publication
1994
Pages
449 - 457
Database
ISI
SICI code
1120-3862(1994)5:4<449:TC>2.0.ZU;2-O
Abstract
In the traditional scenario in cryptography there is one sender, one r eceiver and an active or passive eavesdropper who is an opponent. Larg e bank transactions require two people to sign, implying two senders. So the power to generate a valid transaction is shared. Threshold cryp tography allows one to share the power of a cryptosystem. Threshold cr yptosystems are distinct from threshold schemes in which the power to regenerate a secret key is shared. A normal threshold scheme is not di rectly suited for threshold signatures. Using a threshold scheme direc tly would require the shareholders to send their shares to a trusted p erson who would apply the cryptosystem for them. But the use of such a trusted person violates the main point of threshold cryptography. We motivate the need for treshold cryptosystems, overview the research in the field, and give some simple examples. We will conclude by giving a list of open problems.