jtcoolen / Distributed-key-generation-and-threshold-encryption

Non-interactive distributed key generation based on ideal class groups of imaginary quadratics fields and threshold encryption based on elliptic curve pairings
MIT License
0 stars 0 forks source link

Traitor Tracing support in Threshold Encryption library #6

Open jtcoolen opened 3 hours ago

jtcoolen commented 3 hours ago

Rational key holders could collaboratively compute a decryption machine using MPC without the risk of being penalized (see https://medium.com/@boneh/how-to-slash-misbehavior-in-threshold-decryption-0888af5ae3b6).

To address this, one could assess the solution proposed in the section "Tracing Small Traitor Coalitions" from https://eprint.iacr.org/2023/1724.pdf.