Introduction
1.
Overview
2.
Preliminaries
2.1.
System model and assumptions
2.2.
Cryptographic Primitives
3.
Publicly Verifiable Distributed Key Generation
3.1.
Initialization
3.2.
Publicly Verifiable Secret Sharing
4.
Threshold Encryption Scheme
4.1.
Lagrange Interpolation
4.2.
Decryption Share Aggregation
4.3.
Complete Concrete Scheme
4.4.
Performance
5.
Encrypted Transactions
Appendix
6.
Side Channel Analysis
7.
Threshold Signature Scheme
8.
Key Refresh
9.
Secure enclave computation
10.
Alternative Schemes
10.1.
Pedersen DKG
10.2.
Fast KZG DKG
10.2.1.
Threshold Encryption
Light (default)
Rust
Coal
Navy
Ayu
Ferveo
Pedersen DKG