-
Notifications
You must be signed in to change notification settings - Fork 168
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reasoning behind vss.MinimumT #374
Comments
Mhhhh. I think it's mostly a notation problem here IIUC.
It can probably be clearer I agree ! |
Thanks, @nikkolasg. I'd be grateful if you could expand on why that's the minimum number of shares which can guarantee safe execution of the protocol. (A reference to the relevant part of the paper or some other paper is fine.) |
I just came back on this issue and it just struck me that you're right: the default safe It's actually hardcoded like that in some places using this code and in tests, but not the default... |
I think the source of my confusion may be that the usage of In the first meaning, for safe reconstruction of the secret |
I'm not sure I am following you. If you have (Thanks for these well-spotted issues and for the lengthy discussion ;) ) |
No worries, @nikkolasg. Another way to look at it is to distinguish between the sharing phase and the reconstruction/MPC phase. In the sharing phase you may need a majority of honest participants, but for reconstruction you only need as many shares as the number of coefficients in the polynomial. Those two values can be different, but they are the same in the current implementation, as I read it. That's important for me, because I have an application in mind where I would like a minority of participants to be able to use the distributed key, for liveness purposes. So the threshold specified by |
Ok I see what you mean. At the moment, you can already have a safe DKG with any number of shares, the
I'm working on the PR that will bring a |
Reopening so I don't forget about the |
…s the issue from dedis#374
What's the reasoning behind this value for
MinimumT
?My understanding is that
t
needs to be larger than the plausible size of any dishonest coalition of participants. If more than half are colluding, the paper cited at the top ofrabin/vss.go
suggests that the protocol is broken:Their results seem to suggest this, too:
It's easy for a maximum to flip to a minimum in a slightly changed context, but I'm not quite seeing the reasoning, in the case of
MinimumT
.The text was updated successfully, but these errors were encountered: