[145545] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Is this the first ever practically-deployed use of a threshold scheme?

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Sun Aug 1 13:01:45 2010

From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: pgut001@cs.auckland.ac.nz
Cc: cryptography@metzdowd.com
In-Reply-To: <4C54C2B0.5090503@qyv.net>
Date: Sun, 01 Aug 2010 23:10:55 +1200

Thanks to all the folks who pointed out uses of m-of-n threshold schemes,
however all of them have been for the protection of one-off, very high-value
keys under highly controlled circumstances by trained personnel, does anyone
know of any significant use by J.Random luser?  I'm interested in this from a
usability point of view.

As a corollary, has anyone gone through the process of recovering a key from
shares held by different parties at some time after the point at which they
were created (e.g. six months later), the equivalent of running a restore from
your backups at some point to make sure that you can actually recover your
sysem from it?  How did it go?

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post