YoVDO

Practical Asynchronous Distributed Key Generation

Offered By: IEEE via YouTube

Tags

Distributed Systems Courses Cryptography Courses

Course Description

Overview

Explore a comprehensive conference talk on Asynchronous Distributed Key Generation (ADKG) presented at IEEE. Delve into the intricacies of ADKG[n,t,E] system models, applications, and threshold secret sharing. Examine existing works and new results in the field, including evaluation metrics such as average runtime, bandwidth usage, and computation costs. Learn about the general DKG framework, challenges in asynchrony, and the three main phases: sharing, key proposal, and key derivation. Gain insights into Asynchronous Complete Secret Sharing (ACSS) for random secrets and its performance implications. Enhance your understanding of distributed cryptography and its practical applications in secure, decentralized systems.

Syllabus

Intro
Outline
Asynchronous Distributed Key Generation, ADKG[n,t,E]
System Model
Applications
(n.t + 1) Threshold Secret Sharing
Asynchronous Binary Agreement (ABA)
Asynchronous DKG: Existing works
Asynchronous DKG: Our results
Evaluation Results: Average Runtime
Asynchronous Complete Secret Sharing for random secrets
General DKG Framework
Challenges in Asynchrony
Sharing Phase
Key Proposal Phase
Key Derivation Phase
Evaluation: Runtime
Evaluation: Bandwidth usage
Evaluation: Computation cost ACSS phase
Summary


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera