Do you implement DKG protocol or Joint-Feldman protocol?
I have read an article "Secure Distributed Key Generation for Discrete-Log Based Cryptosystems" by Gennaro Rosario ...
https://link.springer.com/content/pdf/10.1007%2F3-540-48910-X_21.pdf
I have read your code and I think that you have implemented Joint-Feldman protocol(figure 1 in article above).
"An insecure solution for distributed generation of secret keys" - words about Joint-Feldman protocol in this article.
I think that DKG protocol(figure 2 in article above) - is more secure than Joint-Feldman.
"Secure distributed key generation in discrete–log based systems" - words about DKG protocol in this article
Do you implement DKG protocol or Joint-Feldman protocol?
I have read an article "Secure Distributed Key Generation for Discrete-Log Based Cryptosystems" by Gennaro Rosario ...
https://link.springer.com/content/pdf/10.1007%2F3-540-48910-X_21.pdf
I have read your code and I think that you have implemented Joint-Feldman protocol(figure 1 in article above).
"An insecure solution for distributed generation of secret keys" - words about Joint-Feldman protocol in this article.
I think that DKG protocol(figure 2 in article above) - is more secure than Joint-Feldman.
"Secure distributed key generation in discrete–log based systems" - words about DKG protocol in this article