Difference between revisions of "Threshold Key Agreement"
From MgmtWiki
(Created page with "==Full Title or Meme== In a threshold scheme, an underlying key-based cryptographic primitive is executed while a private/secret key is or becomes secret-shared across variou...") |
(→References) |
||
| (One intermediate revision by the same user not shown) | |||
| Line 1: | Line 1: | ||
==Full Title or Meme== | ==Full Title or Meme== | ||
In a threshold scheme, an underlying key-based cryptographic primitive is executed while a private/secret key is or becomes secret-shared across various parties. | In a threshold scheme, an underlying key-based cryptographic primitive is executed while a private/secret key is or becomes secret-shared across various parties. | ||
| + | |||
| + | ==Solutions== | ||
| + | [https://csrc.nist.gov/publications/detail/nistir/8214c/draft NISTIR 8214C (Draft) - NIST First Call for Multi-Party Threshold Schemes] (2023-01-25) | ||
==References== | ==References== | ||
| + | [[Category: Glossary]] | ||
[[Category: Cryptography]] | [[Category: Cryptography]] | ||
Latest revision as of 10:49, 29 January 2023
Full Title or Meme
In a threshold scheme, an underlying key-based cryptographic primitive is executed while a private/secret key is or becomes secret-shared across various parties.
Solutions
NISTIR 8214C (Draft) - NIST First Call for Multi-Party Threshold Schemes (2023-01-25)