Slide 4 of 7
Notes:
THIS IS ADAPTED FROM MY EUROCRYPT TALK
THIS IS A ìJOINEDî SLIDE. IN REAL TALK I GIVE A ìSLIDE SHOWî USING THE 3 SLIDES AT THE END: (but adopted to this format : there are 2 alternative formats, but i think this one is best: computers are better than these ìbean figuresî. Also, I use them in later slides. And the keys and parts of keys are too specific, they just muddle the main idea here) The ìslide showî is like this:
- FIRST THE TWO FIRST SLIDES JOINED : normal signatures, central server honest
- THEN REPLACE NO.2 WITH NO.3 : threshold signature scheme, central server corrupted
DURING THE TALK, I SAY AT THE END OF EXPLAINING THIS SLIDE:
ìTHRESHOLD SYSTEMS PROTECT AGAINST ANY ADVERSARIAL BEHAVIOUR OF THE CORRUPTED PLAYERS, I.E. WE MUST TOLERATE ANY MALICIOUS PROTOCOL THAT THE CORRUPTED PLAYERS MIGHT FOLLOW, WHICH OF COURSE INLUDES BREAKING DOWN, SENDING OUT CONFUSING MESSAGES, USING THE WRONG KEY SHARE, ETC.î