[145536] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Is this the first ever practically-deployed use of a threshold scheme?

daemon@ATHENA.MIT.EDU (Adam Shostack)
Sat Jul 31 18:30:55 2010

Date: Sat, 31 Jul 2010 14:54:53 -0400
From: Adam Shostack <adam@homeport.org>
To: Peter Gutmann <pgut001@cs.auckland.ac.nz>
Cc: cryptography@metzdowd.com
In-Reply-To: <E1Of5no-00071w-Ok@wintermute02.cs.auckland.ac.nz>

On Sat, Jul 31, 2010 at 06:44:12PM +1200, Peter Gutmann wrote:
| Apparently the DNS root key is protected by what sounds like a five-of-seven
| threshold scheme, but the description is a bit unclear.  Does anyone know
| more?
| 
| (Oh, and for people who want to quibble over "practically-deployed", I'm not
|  aware of any real usage of threshold schemes for anything, at best you have
|  combine-two-key-components (usually via XOR), but no serious use of real n-
|  of-m that I've heard of.  Mind you, one single use doesn't necessarily count
|  as "practically deployed" either).

We had a 3 of 7 for the ZKS master keys back in the day. When we
tested, we discovered that no one had written the secret-combining
code, and so Ian Goldberg wrote some and posted it to usenix for
backup.

Adam

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post