Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Practical Asynchronous Distributed Key Generation

IEEE via YouTube

Overview

Explore a comprehensive conference talk on Asynchronous Distributed Key Generation (ADKG) presented at IEEE. Delve into the intricacies of ADKG[n,t,E] system models, applications, and threshold secret sharing. Examine existing works and new results in the field, including evaluation metrics such as average runtime, bandwidth usage, and computation costs. Learn about the general DKG framework, challenges in asynchrony, and the three main phases: sharing, key proposal, and key derivation. Gain insights into Asynchronous Complete Secret Sharing (ACSS) for random secrets and its performance implications. Enhance your understanding of distributed cryptography and its practical applications in secure, decentralized systems.

Syllabus

Intro
Outline
Asynchronous Distributed Key Generation, ADKG[n,t,E]
System Model
Applications
(n.t + 1) Threshold Secret Sharing
Asynchronous Binary Agreement (ABA)
Asynchronous DKG: Existing works
Asynchronous DKG: Our results
Evaluation Results: Average Runtime
Asynchronous Complete Secret Sharing for random secrets
General DKG Framework
Challenges in Asynchrony
Sharing Phase
Key Proposal Phase
Key Derivation Phase
Evaluation: Runtime
Evaluation: Bandwidth usage
Evaluation: Computation cost ACSS phase
Summary

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of Practical Asynchronous Distributed Key Generation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.