The DKG protocol executes the following functions when it encounters the corresponding triggers :
To enable the functions proposed in the paper Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography, we will need to add an additional function after the DKG completes.
This function generateIBCKey will