Is this the first ever practically-deployed use of a threshold scheme?

Peter Trei treip at responseconcepts.com
Mon Aug 2 08:06:26 EDT 2010


On 7/31/2010 2:54 PM, Adam Shostack wrote:
> On Sat, Jul 31, 2010 at 06:44:12PM +1200, Peter Gutmann wrote:
> | Apparently the DNS root key is protected by what sounds like a five-of-seven
> | threshold scheme, but the description is a bit unclear.  Does anyone know
> | more?
> |
> | (Oh, and for people who want to quibble over "practically-deployed", I'm not
> |  aware of any real usage of threshold schemes for anything, at best you have
> |  combine-two-key-components (usually via XOR), but no serious use of real n-
> |  of-m that I've heard of.  Mind you, one single use doesn't necessarily count
> |  as "practically deployed" either).
>
> We had a 3 of 7 for the ZKS master keys back in the day. When we
> tested, we discovered that no one had written the secret-combining
> code, and so Ian Goldberg wrote some and posted it to usenix for
> backup.
>    
At RSA Security back in the early 2000s, I devised protection schemes, 
and wrote product code using 5 of 7 Shamir secret sharing for certain 
products.

Peter Trei



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list