Distributed Key Generation In The Wild

 
  1. Distributed Energy Generation
  2. Distributed Generation Resources
  3. Distributed Key Generation In The Wild Life

An implementation of the protocol described in 'Distributed KeyGeneration in the Wild' (see references) for Erlang (using pairingbased cryptography). This library will allow some number of Erlangprocesses (where N >= 4) to generate one PBC (seehere for more details) key ina manner tolerant of Byzantine faults.

Some limitations, where this code does not implement the full protocol: Warcraft 3 cd keys generator.

Distributed Energy Generation

  • It produces only one key, as it does not support round changes.
  • It does not implement the pessimistic phase (leader change). Recovery (or rather retry) is handled outside of the protocol.
  • It does not implement the recovery phase. Since there is no concept of rounds, a user must start a new dkg if the process fails or times out.

This code is not run directly, but as arelcast behavior. To see an example of how this code is run and used, seehere.

An implementation of the protocol described in 'Distributed Key Generation in the Wild' (see references) for Erlang (using pairing based cryptography). This library will allow some number of Erlang processes (where N = 4) to generate one PBC (see here for more details) key in a manner tolerant of Byzantine faults.

Jul 04, 2012 Cryptology ePrint Archive: Report 2012/377. Distributed Key Generation in the Wild. Dvd photo slideshow key generator. Aniket Kate and Yizhou Huang and Ian Goldberg. Abstract: Distributed key generation (DKG) has been studied extensively in the cryptographic literature. However, it has never been examined outside of the synchronous setting, and the known DKG protocols cannot. Al 12 also proposed distributed private key generators for identity based cryptography, but this paper gives a more generalized construction, which actually predates 12 and first.

KeyDistributed generation resources

Distributed Generation Resources

Build

Test

Distributed Key Generation In The Wild Life

References