Is this the first ever practically-deployed use of a threshold scheme?

Peter Gutmann pgut001 at cs.auckland.ac.nz
Sun Aug 1 07:10:55 EDT 2010


Thanks to all the folks who pointed out uses of m-of-n threshold schemes,
however all of them have been for the protection of one-off, very high-value
keys under highly controlled circumstances by trained personnel, does anyone
know of any significant use by J.Random luser?  I'm interested in this from a
usability point of view.

As a corollary, has anyone gone through the process of recovering a key from
shares held by different parties at some time after the point at which they
were created (e.g. six months later), the equivalent of running a restore from
your backups at some point to make sure that you can actually recover your
sysem from it?  How did it go?

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list