{"article_processing_charge":"No","language":[{"iso":"eng"}],"type":"preprint","month":"09","date_published":"2019-09-10T00:00:00Z","author":[{"id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","full_name":"KOKORIS KOGIAS, Eleftherios","first_name":"Eleftherios","last_name":"KOKORIS KOGIAS"},{"full_name":"Spiegelman, Alexander","first_name":"Alexander","last_name":"Spiegelman"},{"full_name":"Malkhi, Dahlia","first_name":"Dahlia","last_name":"Malkhi"},{"first_name":"Ittai","last_name":"Abraham","full_name":"Abraham, Ittai"}],"citation":{"apa":"Kokoris Kogias, E., Spiegelman, A., Malkhi, D., & Abraham, I. (n.d.). Bootstrapping consensus without trusted setup: fully asynchronous distributed key generation. Cryptology ePrint Archive.","mla":"Kokoris Kogias, Eleftherios, et al. “Bootstrapping Consensus without Trusted Setup: Fully Asynchronous Distributed Key Generation.” Cryptology EPrint Archive, 2019/1015.","ieee":"E. Kokoris Kogias, A. Spiegelman, D. Malkhi, and I. Abraham, “Bootstrapping consensus without trusted setup: fully asynchronous distributed key generation,” Cryptology ePrint Archive. .","ista":"Kokoris Kogias E, Spiegelman A, Malkhi D, Abraham I. Bootstrapping consensus without trusted setup: fully asynchronous distributed key generation. Cryptology ePrint Archive, 2019/1015.","short":"E. Kokoris Kogias, A. Spiegelman, D. Malkhi, I. Abraham, Cryptology EPrint Archive (n.d.).","ama":"Kokoris Kogias E, Spiegelman A, Malkhi D, Abraham I. Bootstrapping consensus without trusted setup: fully asynchronous distributed key generation. Cryptology ePrint Archive.","chicago":"Kokoris Kogias, Eleftherios, Alexander Spiegelman, Dahlia Malkhi, and Ittai Abraham. “Bootstrapping Consensus without Trusted Setup: Fully Asynchronous Distributed Key Generation.” Cryptology EPrint Archive, n.d."},"publication_status":"submitted","status":"public","year":"2019","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publication":"Cryptology ePrint Archive","abstract":[{"text":"In this paper, we present the first fully asynchronous distributed key generation (ADKG) algorithm as well as the first distributed key generation algorithm that can create keys with a dual (f,2f+1)−threshold that are necessary for scalable consensus (which so far needs a trusted dealer assumption). In order to create a DKG with a dual (f,2f+1)− threshold we first answer in the affirmative the open question posed by Cachin et al. how to create an AVSS protocol with recovery thresholds f+1