The Gennaro Distributed Key Generation Algorithm as described here
This crate has received one security audit from Kudelski Security with no significant findings. The audit report can be found here. We'd like to thank LIT Protocol for sponsoring this audit.
The protocol provided in this crate provides the following
- It will continue as long as there are enough participants a.k.a above the threshold
- Abort if the number of participants drops below the threshold
Malformed messages are not allowed and result in bad participants. Non-responsive participants are out of scope for this crate since this includes timeouts and retries which could be for a number of reasons: network latency, system crashes, etc. This is left to consumers as is handling the creation a secure channel to send data.
A good description of methods to do this can be found here.
In a nut shell:
- Use Signal Protocol since this offers the highest security.
- Use the latest version of TLS if you can rely on and trust PKI.
Licensed under either of
- Apache License, Version 2.0, (LICENSE-APACHE or http://www.apache.org/licenses/LICENSE-2.0)
- MIT license (LICENSE-MIT or http://opensource.org/licenses/MIT)
at your option.
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.