Download now Free registration required
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these devices, the threshold t + 1, need to be present to use the key. The benefits are increased security, because an adversary can compromise up to t devices, and resilience, since any subset of t + 1 device is sufficient. Many personal devices are not suitable for threshold schemes, because they do not offer secure storage, which is needed to store shares of the private key.
- Format: PDF
- Size: 261.4 KB