Km. Martin et J. Nakahara, Weaknesses of protocols for updating the parameters of an established threshold scheme, IEE P-COM D, 148(1), 2001, pp. 45-48
Threshold schemes are adaptable cryptographic primitives that distribute tr
ust in secret data by requiring k out of n entities to co-operate before th
e data can be recovered. An important security management issue relating to
threshold schemes is the problem of updating the parameters of a threshold
scheme. The paper discusses serious shortcomings in two proposed protocols
for threshold parameter update.