Overview
Syllabus
Intro
Outline
Asynchronous Distributed Key Generation, ADKG[n,t,E]
System Model
Applications
(n.t + 1) Threshold Secret Sharing
Asynchronous Binary Agreement (ABA)
Asynchronous DKG: Existing works
Asynchronous DKG: Our results
Evaluation Results: Average Runtime
Asynchronous Complete Secret Sharing for random secrets
General DKG Framework
Challenges in Asynchrony
Sharing Phase
Key Proposal Phase
Key Derivation Phase
Evaluation: Runtime
Evaluation: Bandwidth usage
Evaluation: Computation cost ACSS phase
Summary
Taught by
IEEE Symposium on Security and Privacy