Why are the guardian "key backups" not used by default? #306
-
During the key ceremony, the An easier way to proceed after the key ceremony would be to just sum up all the Right now, for 3 out of 5 guardians, decrypting with 2 refusing guardians results in 3 group elements per cooperating guardian and 13 per refusing guardian: 2 * 13 + 3*3 = 35. Using the redistributed key only requires 9. Using the shamir-shared key directly also vastly cuts down complexity in my opinion, as each guardian now only has to hold a single secret value (their shamir-share of the |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 5 replies
-
We don't want to ever form this secret polynomial or the joint secret key. Anyone with access to this single secret key would be able to decrypt individual votes. With the process that we use, not only is the joint secret key never formed, but missing guardian keys are never formed either. If, in the example you give, we were to do the simpler thing and just reconstruct the secret keys of the two missing guardians, then from that point forward, any one remaining guardian could decrypt individual votes. Guardians never reveal their secret key material. Instead, they use their secret keys to perform partial decryptions and their shares of missing guardian secret keys to form shares of missing partial decryptions. This provides maximal protection to the secret keys. |
Beta Was this translation helpful? Give feedback.
We don't want to ever form this secret polynomial or the joint secret key. Anyone with access to this single secret key would be able to decrypt individual votes. With the process that we use, not only is the joint secret key never formed, but missing guardian keys are never formed either. If, in the example you give, we were to do the simpler thing and just reconstruct the secret keys of the two missing guardians, then from that point forward, any one remaining guardian could decrypt individual votes.
Guardians never reveal their secret key material. Instead, they use their secret keys to perform partial decryptions and their shares of missing guardian secret keys to form shares of missi…