6,329 followers
@BobMcElrath @CasaHODL @lopp Hm, I had not looked into this. It seems that the canonical reference is Benaloh and Leichter 1988 (https://t.co/yYnDWYZyDC). I think it's reasonable to first try to obtain a secure threshold scheme based on Shamir secret shari