Sizing Up the Threshold: Challenges and Opportunities in the Standardization of Threshold Schemes for Cryptographic Primitives (A30c)
Threshold schemes can be used to promote secure implementations of cryptographic primitives, even when a number (lower than a certain threshold) of components in a device or of parties in a distributed system may become compromised. In this presentation we pose questions to the community about challenges and opportunities in the process of moving towards standardization of such schemes. How should we characterize threshold schemes for the purpose of formulating security assertions about them? How should these security assertions be validated? At which level of detail should threshold schemes be standardized? How do attacks affect different security properties? This session waill give some emphasis to testing and validation of implementations of threshold schemes for cryptographic primitives as mandatory steps towards enabling this technology within the US federal government and beyond.