Security

Increased Resilience in Threshold Cryptography: Sharing a Secret With Devices That Cannot Store Shares

Download Now Free registration required

Executive Summary

Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these devices, the threshold t + 1, need to be present to use the key. The benefits are increased security, because an adversary can compromise up to t devices, and resilience, since any subset of t + 1 device is sufficient. Many personal devices are not suitable for threshold schemes, because they do not offer secure storage, which is needed to store shares of the private key.

  • Format: PDF
  • Size: 261.4 KB