[145521] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Is this the first ever practically-deployed use of a threshold scheme?

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Sat Jul 31 12:35:57 2010

From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: cryptography@metzdowd.com
Date: Sat, 31 Jul 2010 18:44:12 +1200

Apparently the DNS root key is protected by what sounds like a five-of-seven
threshold scheme, but the description is a bit unclear.  Does anyone know
more?

(Oh, and for people who want to quibble over "practically-deployed", I'm not
 aware of any real usage of threshold schemes for anything, at best you have
 combine-two-key-components (usually via XOR), but no serious use of real n-
 of-m that I've heard of.  Mind you, one single use doesn't necessarily count
 as "practically deployed" either).

Peter (who has two more Perry-DoS-ing conversation-starter posts to make, but
       will leave them for awhile now :-).

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post