[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-dev] A threshold signature-based proposal for a shared RNG
On Fri, Jan 17, 2014 at 10:01:13PM -0600, Nicholas Hopper wrote:
> > Yes: Nick (who would probably be the one writing the code anyway)
> > generates the shares encrypted to keys generated by the authority
> > operators, sends them to the authority operators, and forgets the
> > intermediate results. ;-) (Only partially kidding.)
>
> Ha! Yes, byzantine agreement is much easier with a trusted party. :)
>
> > Then again, if *that* code is written, then just having each authority
> > operator run an instance of that code in the role of Nick, and having
> > everyone add their results, works fine if everyone is online. It's also
> > easy to check that the protocol succeeeded, by interpolating the
> > resulting public keys. An actively malicious adversary during this
> > phase would cause the protocol to fail, but I think it would be good to
> > know that we have an actively malicious authority. ;-)
>
> Let's call this the "optimistic approach", and it would certainly be
> an option, although one issue is that when it fails we can say that
> someone is malicious but not which authority(s). Although one
> possibility is to have the ability to fall back to a full
> byzantine-tolerant protocol in that event.
Actually, I think the above "optimistic" protocol _would_ let you
identify the misbehaving party if each message is signed by its sender.
- Ian
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev