Non-interactive distributed key generation based on ideal class groups of imaginary quadratics fields and threshold encryption based on elliptic curve pairings
MIT License
0
stars
0
forks
source link
Traitor Tracing support in Threshold Encryption library #6
Rational key holders could collaboratively compute a decryption machine using MPC without the risk of being penalized (see https://medium.com/@boneh/how-to-slash-misbehavior-in-threshold-decryption-0888af5ae3b6).
To address this, one could assess the solution proposed in the section "Tracing Small Traitor Coalitions" from https://eprint.iacr.org/2023/1724.pdf.