Increased Resilience in Threshold Cryptography: Sharing a Secret With Devices That Cannot Store Shares

Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these devices, the threshold t + 1, need to be present to use the key. The benefits are increased security, because an adversary can compromise up to t devices, and resilience, since any subset of t + 1 device is sufficient. Many personal devices are not suitable for threshold schemes, because they do not offer secure storage, which is needed to store shares of the private key.

Provided by: Katholieke Universiteit Leuven Topic: Security Date Added: Apr 2010 Format: PDF

Download Now

Find By Topic