<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.hallambaker-threshold" target="https://datatracker.ietf.org/doc/html/draft-hallambaker-threshold-00">
   <front>
      <title>Threshold Key Generation and Decryption in Ed25519 and Ed448</title>
      <author initials="P." surname="Hallam-Baker" fullname="Phillip Hallam-Baker">
         <organization>Venture Cryptography.</organization>
      </author>
      <date month="January" day="5" year="2020" />
      <abstract>
	 <t>   Threshold cryptography schemes are described with application to the
   Ed25519, Ed448, X25519 and X448 Elliptic Curves.  Threshold key
   generation allows generation of keypairs to be divided between two or
   more parties with verifiable security guaranties.  Threshold
   decryption allows elliptic curve key agreement to be divided between
   two or more parties such that all the parties must co-operate to
   complete a private key agreement operation.  The same primitives may
   be applied to improve resistance to side channel attacks.

   https://mailarchive.ietf.org/arch/browse/cfrg/
   (http://whatever)Discussion of this draft should take place on the
   CFRG mailing list (cfrg@irtf.org), which is archived at .

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-hallambaker-threshold-00" />
   
</reference>
