Threshold cryptosystems

  • Desmedt Y
  • Frankel Y
  • 82


    Mendeley users who have this article in their library.
  • 576


    Citations of this article.


Often the power to use a cryptosystem has to be shared. In threshold schemes, t-out-of-l have the power to regenerate a secret key (while less than t have not). However threshold schemes cannot be used directly in many applications, such as threshold signatures in which t-out-of-l have to co-sign a message. A normal threshold scheme would require the shareholders to send their shares to a trusted person who would sign for them. But the use of such a trusted person violates the main point of threshold signatures!

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document

Get full text


  • Yvo Desmedt

  • Yair Frankel

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free