Abstract. In this presentation we give a brief note about the main requirements of a threshold signing scheme for the TLS protocol. Separating the signing capabilities across multiple remote parties helps to reduce the damage after a (part of a) key is compromised. Reverse proxies that terminate TLS connections have particular requirements for the use of a threshold signing algorithm. We developed an implementation for threshold RSA, and currently working on the ECDSA case.
MPTS 2023: NIST Workshop on Multi-party Threshold Schemes 2023
Starts: September 26, 2023Virtual
Security and Privacy: cryptography