I-D Action: draft-hallambaker-threshold-07.txt

internet-drafts@ietf.org Wed, 20 April 2022 20:42 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: i-d-announce@ietf.org
Delivered-To: i-d-announce@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 3469A3A09E1 for <i-d-announce@ietf.org>; Wed, 20 Apr 2022 13:42:35 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Subject: I-D Action: draft-hallambaker-threshold-07.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 8.0.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <165048735510.9455.11937477500317308315@ietfa.amsl.com>
Date: Wed, 20 Apr 2022 13:42:35 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/i-d-announce/pj_vzpQIm2Jf-zM41XZSoyhGaf8>
X-BeenThere: i-d-announce@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Internet Draft Announcements only <i-d-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i-d-announce/>
List-Post: <mailto:i-d-announce@ietf.org>
List-Help: <mailto:i-d-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2022 20:42:35 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.


        Title           : Threshold Modes in Elliptic Curves
        Author          : Phillip Hallam-Baker
	Filename        : draft-hallambaker-threshold-07.txt
	Pages           : 39
	Date            : 2022-04-20

Abstract:
   Threshold cryptography operation modes are described with application
   to the Ed25519, Ed448, X25519 and X448 Elliptic Curves.  Threshold
   key generation allows generation of keypairs to be divided between
   two or more parties with verifiable security guaranties.  Threshold
   decryption allows elliptic curve key agreement to be divided between
   two or more parties such that all the parties must co-operate to
   complete a private key agreement operation.  The same primitives may
   be applied to improve resistance to side channel attacks.  A
   Threshold signature scheme is described in a separate document.

   https://mailarchive.ietf.org/arch/browse/cfrg/
   (http://whatever)Discussion of this draft should take place on the
   CFRG mailing list (cfrg@irtf.org), which is archived at .


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-hallambaker-threshold/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-hallambaker-threshold-07.html

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-hallambaker-threshold-07


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts