Thanks to all the folks who pointed out uses of m-of-n threshold schemes,
however all of them have been for the protection of one-off, very high-value
keys under highly controlled circumstances by trained personnel, does anyone
know of any significant use by J.Random luser?  I'm interested in this from a
usability point of view.

As a corollary, has anyone gone through the process of recovering a key from
shares held by different parties at some time after the point at which they
were created (e.g. six months later), the equivalent of running a restore from
your backups at some point to make sure that you can actually recover your
sysem from it?  How did it go?

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [email protected]

Reply via email to