Weaknesses of protocols for updating the parameters of an established threshold scheme

Citation
Km. Martin et J. Nakahara, Weaknesses of protocols for updating the parameters of an established threshold scheme, IEE P-COM D, 148(1), 2001, pp. 45-48
Citations number
14
Categorie Soggetti
Computer Science & Engineering
Journal title
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES
ISSN journal
13502387 → ACNP
Volume
148
Issue
1
Year of publication
2001
Pages
45 - 48
Database
ISI
SICI code
1350-2387(200101)148:1<45:WOPFUT>2.0.ZU;2-Q
Abstract
Threshold schemes are adaptable cryptographic primitives that distribute tr ust in secret data by requiring k out of n entities to co-operate before th e data can be recovered. An important security management issue relating to threshold schemes is the problem of updating the parameters of a threshold scheme. The paper discusses serious shortcomings in two proposed protocols for threshold parameter update.