This is a potential security issue, you are being redirected to https://csrc.nist.gov.
Abstract. In this presentation we give a brief note about the main requirements of a threshold signing scheme for the TLS protocol. Separating the signing capabilities across multiple remote parties helps to reduce the damage after a (part of a) key is compromised. Reverse proxies that terminate TLS connections have particular requirements for the use of a threshold signing algorithm. We developed an implementation for threshold RSA, and currently working on the ECDSA case.
Security and Privacy: cryptography