Towards Scalable Threshold Cryptosystems

Towards Scalable Threshold Cryptosystems

IEEE Symposium on Security and Privacy via YouTube Direct link

Verifiable Secret Sharing (VSS) prevents attacks

5 of 13

5 of 13

Verifiable Secret Sharing (VSS) prevents attacks

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Towards Scalable Threshold Cryptosystems

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Towards Scalable Threshold Cryptosystems
  2. 2 Threshold signature schemes (TSS)
  3. 3 TSS efficiency & scalability challenges
  4. 4 Shamir's Secret Sharing
  5. 5 Verifiable Secret Sharing (VSS) prevents attacks
  6. 6 KZG-based VSS dealing does not scale
  7. 7 Key ingredient: Polynomial multipoint evaluation
  8. 8 Authenticated Multipoint Evaluation Trees (AMTs)
  9. 9 The road so far
  10. 10 TSS aggregation does not scale
  11. 11 Why TSS aggregation doesn't scale
  12. 12 Our TSS aggregation scales!
  13. 13 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.