Practical Asynchronous Distributed Key Generation
Offered By: IEEE via YouTube
Course Description
Overview
Explore a comprehensive conference talk on Asynchronous Distributed Key Generation (ADKG) presented at IEEE. Delve into the intricacies of ADKG[n,t,E] system models, applications, and threshold secret sharing. Examine existing works and new results in the field, including evaluation metrics such as average runtime, bandwidth usage, and computation costs. Learn about the general DKG framework, challenges in asynchrony, and the three main phases: sharing, key proposal, and key derivation. Gain insights into Asynchronous Complete Secret Sharing (ACSS) for random secrets and its performance implications. Enhance your understanding of distributed cryptography and its practical applications in secure, decentralized systems.
Syllabus
Intro
Outline
Asynchronous Distributed Key Generation, ADKG[n,t,E]
System Model
Applications
(n.t + 1) Threshold Secret Sharing
Asynchronous Binary Agreement (ABA)
Asynchronous DKG: Existing works
Asynchronous DKG: Our results
Evaluation Results: Average Runtime
Asynchronous Complete Secret Sharing for random secrets
General DKG Framework
Challenges in Asynchrony
Sharing Phase
Key Proposal Phase
Key Derivation Phase
Evaluation: Runtime
Evaluation: Bandwidth usage
Evaluation: Computation cost ACSS phase
Summary
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Advanced Operating SystemsGeorgia Institute of Technology via Udacity High Performance Computing
Georgia Institute of Technology via Udacity GT - Refresher - Advanced OS
Georgia Institute of Technology via Udacity Distributed Machine Learning with Apache Spark
University of California, Berkeley via edX CS125x: Advanced Distributed Machine Learning with Apache Spark
University of California, Berkeley via edX