Is this the first ever practically-deployed use of a threshold scheme?
Peter Gutmann
pgut001 at cs.auckland.ac.nz
Sun Aug 1 07:10:55 EDT 2010
Thanks to all the folks who pointed out uses of m-of-n threshold schemes,
however all of them have been for the protection of one-off, very high-value
keys under highly controlled circumstances by trained personnel, does anyone
know of any significant use by J.Random luser? I'm interested in this from a
usability point of view.
As a corollary, has anyone gone through the process of recovering a key from
shares held by different parties at some time after the point at which they
were created (e.g. six months later), the equivalent of running a restore from
your backups at some point to make sure that you can actually recover your
sysem from it? How did it go?
Peter.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list