Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a cutting-edge presentation from USENIX Security '23 on practical asynchronous high-threshold distributed key generation and distributed polynomial sampling. Delve into the innovative work by researchers from the University of Illinois at Urbana-Champaign, Aptos, IST Austria, and Mysten Labs as they introduce a simple and efficient asynchronous Distributed Key Generation (DKG) protocol. Learn how this protocol supports high reconstruction thresholds, tolerates malicious nodes, and significantly improves upon existing solutions. Discover the protocol's applications in randomness beacons, threshold signatures, Byzantine consensus, and multiparty computation. Examine the technical details, including the expected communication cost and security assumptions. Gain insights into the implementation and evaluation of the protocol using a network of up to 128 geographically distributed nodes, and understand how it achieves substantial improvements in running time and bandwidth usage compared to state-of-the-art alternatives.