N. Liebau, A. Mauthe, V. Darlagiannis, R. Steinmetz
{"title":"主动秘密共享在点对点系统中执行吗?","authors":"N. Liebau, A. Mauthe, V. Darlagiannis, R. Steinmetz","doi":"10.4230/OASIcs.KiVS.2011.239","DOIUrl":null,"url":null,"abstract":"Trustworthy applications in fully decentralized systems require a trust anchor. This paper describes how such an anchor can be implemented efficiently in p2p systems. The basic concept is to use threshold cryptography in order to sign messages by a quorum of peers. The focus is put on advanced mechanisms to secure the shares of the secret key over time, using proactive secret sharing. This mechanism was researched in context of the token-based accounting scheme.","PeriodicalId":175998,"journal":{"name":"Kommunikation in Verteilten Systemen","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Does Proactive Secret Sharing Perform in Peer-to-Peer Systems?\",\"authors\":\"N. Liebau, A. Mauthe, V. Darlagiannis, R. Steinmetz\",\"doi\":\"10.4230/OASIcs.KiVS.2011.239\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Trustworthy applications in fully decentralized systems require a trust anchor. This paper describes how such an anchor can be implemented efficiently in p2p systems. The basic concept is to use threshold cryptography in order to sign messages by a quorum of peers. The focus is put on advanced mechanisms to secure the shares of the secret key over time, using proactive secret sharing. This mechanism was researched in context of the token-based accounting scheme.\",\"PeriodicalId\":175998,\"journal\":{\"name\":\"Kommunikation in Verteilten Systemen\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Kommunikation in Verteilten Systemen\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4230/OASIcs.KiVS.2011.239\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Kommunikation in Verteilten Systemen","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4230/OASIcs.KiVS.2011.239","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Does Proactive Secret Sharing Perform in Peer-to-Peer Systems?
Trustworthy applications in fully decentralized systems require a trust anchor. This paper describes how such an anchor can be implemented efficiently in p2p systems. The basic concept is to use threshold cryptography in order to sign messages by a quorum of peers. The focus is put on advanced mechanisms to secure the shares of the secret key over time, using proactive secret sharing. This mechanism was researched in context of the token-based accounting scheme.