The DKG protocol, in short

February 19, 2013 | Posted in Asynchronous Key Generation for IBE | Ajoy Oommen

When the DKG protocol completes, it outputs a secret for each of the nodes participating in the protocol. In short, the above process proceeds as below:

  1. HybridVSS – In this process, a node selects a secret and shares it among all the other nodes. At the end of the process, every other node has a share of the secret, such that any subset (of nodes), of size greater than t, will be able to reconstruct the original secret from the shares.
  2. All nodes run the HybridVSS. When all the nodes complete the VSS, every node will have a share of the secret selected by every other node.
  3. Finally, all the shares that a node holds, are combined to generate the DKG share.

Related Posts

05 Mar 2013 » Importing and exporting an element in PBC

27 Feb 2013 » Modifying a DKG header

23 Feb 2013 » Analyzing messages in DKG

23 Feb 2013 » Understanding DKG

20 Feb 2013 » Pseudo code for the mathematical functions

20 Feb 2013 » Distributed Key Generation in BFIBC

19 Feb 2013 » Modifying the DKG protocol

19 Feb 2013 » The DKG Protocol

19 Feb 2013 » Asynchronous Distributed Key Generation for Identity-Based Cryptography

19 Feb 2013 » Distributed Key Generation