diff --git a/secret_sharing_and_dkg/README.md b/secret_sharing_and_dkg/README.md index 109b0ff2..9eee4495 100644 --- a/secret_sharing_and_dkg/README.md +++ b/secret_sharing_and_dkg/README.md @@ -1,7 +1,8 @@ # Secret sharing and distributed key generation Implements Secret Sharing (SS), Verifiable Secret Sharing (VSS), Distributed Verifiable Secret Sharing (DVSS) and Distributed -Key Generation (DKG) algorithms. DVSS and DKG do not require a trusted dealer. +Key Generation (DKG) algorithms. DVSS and DKG do not require a trusted dealer. Also implements a distributed discrete log check. + 1. [Shamir secret sharing (Requires a trusted dealer)](./src/shamir_ss.rs) 1. [Pedersen Verifiable Secret Sharing](./src/pedersen_vss.rs) diff --git a/secret_sharing_and_dkg/src/distributed_dlog_check/README.md b/secret_sharing_and_dkg/src/distributed_dlog_check/README.md index 6f87125c..10b12973 100644 --- a/secret_sharing_and_dkg/src/distributed_dlog_check/README.md +++ b/secret_sharing_and_dkg/src/distributed_dlog_check/README.md @@ -99,4 +99,4 @@ properly created, `UC_i` needs to prove using the similar protocol as above but This method of creating share as Pedersen commitment is not implemented yet. -**CREDIT**: Using pairings for maliciously secure protocol was suggested by [Massimiliano Sala](https://webapps.unitn.it/du/en/Persona/PER0000604/Didattica) +**CREDIT**: Using pairings for maliciously secure protocol was suggested by [Massimiliano Sala](https://www.science.unitn.it/~sala/) diff --git a/secret_sharing_and_dkg/src/distributed_dlog_check/mod.rs b/secret_sharing_and_dkg/src/distributed_dlog_check/mod.rs index 2a13ad7b..73059666 100644 --- a/secret_sharing_and_dkg/src/distributed_dlog_check/mod.rs +++ b/secret_sharing_and_dkg/src/distributed_dlog_check/mod.rs @@ -99,7 +99,7 @@ //! This method of creating share as Pedersen commitment is not implemented yet. //! //! -//! **CREDIT**: Using pairings for maliciously secure protocol was suggested by [Massimiliano Sala](https://webapps.unitn.it/du/en/Persona/PER0000604/Didattica) +//! **CREDIT**: Using pairings for maliciously secure protocol was suggested by [Massimiliano Sala](https://www.science.unitn.it/~sala/) //! pub mod maliciously_secure;