U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
Presentation

MPC-based key management – Using threshold trust to address different threat models

November 5, 2020

Presenters

Jakob Pagter - Sepior

Description

Abstract: In key management based on Multi-Party Computation (MPC) cryptographic primitives are implemented through a distributed protocol executed by a set of MPC components. A fundamental but often ignored part of this, is the way in which control over the individual MPC components is used to address the threat model of the application. This allows the nice mathematical properties of threshold cryptography to address different trust models or different threat models. In this brief we will provide two examples (one where each MPC node is owned by the same enterprise, and one where nodes reflect different policy elements as well as end-user control) and use these to start a discussion about constructing a taxonomy for how to align threats with what it offered by security architectures offered by MPC.

Presented at

NIST Workshop on Multi-Party Threshold Schemes (MPTS) 2020. https://csrc.nist.rip/events/2020/mpts2020

Event Details

Location

    
                            

Related Topics

Security and Privacy: cryptography

Created May 04, 2021, Updated June 07, 2021