Threshold Cryptosystems from Threshold Fully Homomorphic Encryption
2
Introduction to Characters
3
Key Management
4
Threshold Cryptography (t out of n)
5
Threshold Signatures
6
Threshold Public Key Encryption
7
Encryption (TFHE)
8
Security Definitions
9
Starting Point: [GSW13] FHE Scheme
10
Recap: [GSW13]
11
Smudging with noise
12
How to Fix Noise Blowup?
13
How Expressive is {0,1}-LSSS?
14
Comparison of two schemes
15
Universal Thresholdizer
16
Application of Techniques
17
Open Problems
Description:
Explore a comprehensive presentation from Crypto 2018 on threshold cryptosystems derived from threshold fully homomorphic encryption. Delve into key concepts including character introduction, key management, threshold cryptography, signatures, and public key encryption. Examine the [GSW13] FHE scheme, noise smudging techniques, and solutions for noise blowup. Compare different schemes, investigate the expressiveness of {0,1}-LSSS, and learn about the universal thresholdizer. Discover practical applications of these techniques and consider open problems in the field of threshold cryptography.
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption