University of Tartu - ©2011 Rafik Chaabouni - Last update: 21.05.2013 23:53
Date: 23/05/2013 at 16:10 sharp
Location: J. Liivi 2, room 317 (next to the coffee room)
Speaker: Rafik Chaabouni
Title: Threshold cryptography
Abstract:
Threshold cryptography covers the area in cryptography where participants needs to be sufficiently numerous in order to perform a cryptographic task. For instance, we can require that to decrypt a cyphertext, at least t decryption servers are required out of n servers.
First I will explain the Lagrange interpolation, as it is an important building block for any threshold system. Then I will present Shamir's secret sharing. I will explain the threshold systems with the distinction between threshold signature and threshold decryption. To conclude, I will give the example of Threshold ElGamal as it is one of the simplest to explain.