Common use of Cryptographic Primitives Clause in Contracts

Cryptographic Primitives. Public-Key Infrastructure. We assume that parties have access to a public-key infrastruc- ture. This means parties agree on a set of public keys (pk1, . . . , pkn) and party Pi holds the secret key ski associated with pki. 3 However, note that our protocols for BA are adaptively secure. Definition 1. A (digital) signature scheme is a triple of algorithms (Sgn, Vfy, Kgn) such that: – given the security parameter κ, the key generation algorithm Kgn outputs a public/secret key pair (pk, sk) ; – given a secret key sk and a message m 0, 1 ∗, the signing algorithm Sgn outputs σ := Sgn(m, sk);

Appears in 2 contracts

Sources: Byzantine Agreement and Multi Party Computation, Byzantine Agreement and Multi Party Computation

Cryptographic Primitives. Public-Key Infrastructure. We assume that parties have access to a public-key infrastruc- ture. This means parties agree on a set of public keys (pk1, . . . , pkn) and party Pi holds the secret key ski associated with pki. 3 However, note that our protocols for BA are adaptively secure. . Definition 1. A (digital) signature scheme is a triple of algorithms (Sgn, Vfy, Kgn) such that: – given the security parameter κ, the key generation algorithm Kgn outputs a public/secret key pair (pk, sk) ; – given a secret key sk and a message m 0, 1 ∗, the signing algorithm Sgn outputs σ := Sgn(m, sk);

Appears in 2 contracts

Sources: Conference Paper, Byzantine Agreement and Multi Party Computation