1. Introduction
  2. 1. Overview
  3. 2. Preliminaries
    1. 2.1. System model and assumptions
    2. 2.2. Cryptographic Primitives
  4. 3. Publicly Verifiable Distributed Key Generation
    1. 3.1. Initialization
    2. 3.2. Publicly Verifiable Secret Sharing
  5. 4. Threshold Encryption Scheme
    1. 4.1. Lagrange Interpolation
    2. 4.2. Decryption Share Aggregation
    3. 4.3. Complete Concrete Scheme
    4. 4.4. Performance
  6. 5. Encrypted Transactions
  7. Appendix
  8. 6. Side Channel Analysis
  9. 7. Threshold Signature Scheme
  10. 8. Key Refresh
  11. 9. Secure enclave computation
  12. 10. Alternative Schemes
    1. 10.1. Pedersen DKG
    2. 10.2. Fast KZG DKG
      1. 10.2.1. Threshold Encryption

Ferveo

Pedersen DKG