Distributed Key Generator (DKG)
The Distributed Key Generator (DKG) is a critical protocol component responsible for provisioning cryptographic keys for a secure, time-locked encryption/decryption mechanism. This mechanism is formalized via Single Key Delay Encryption (SKDE).
Core Functions
DKG is designed to provide the foundational certainty necessary for high-value operations:
Byzantine Fault Tolerance (BFT): Implements BFT to safeguard the system. By decentralizing key management, DKG ensures that operator failure does not compromise the cryptographic security of the entire system.
Distributed Architecture: Multiple specialized nodes decentralize the key management process, eliminating the single point of failure inherent in centralized key storage.
Time-Lock Encryption: Keys for encryption are available immediately; decryption keys are released only after pre-determined time intervals.
SKDE Integration: Seamlessly integrates with the SKDE framework to guarantee the integrity of time-locked cryptographic operations.
High Performance: Achieves efficient key generation and consensus via asynchronous task processing.
Architecture
DKG operates through four specialized node types, each contributing to the security and integrity of the key lifecycle:

Node Roles
Role
Purpose
Key Responsibilities
Authority
Trusted Setup Manager
Constructs, manages, and securely distributes SKDE parameters.
Committee
Key Generation Leader
Generates encryption keys and coordinates consensus among nodes.
Solver
Decryption Provider
Computes the time-lock decryption keys.
Verifier
Network Monitoring
Detects, monitors, and reports any Byzantine (malicious or faulty) behavior within the network.
How DKG Works
DKG utilizes a time-locked encryption model:
Setup Phase: The Authority node initializes the system by generating and distributing foundational SKDE parameters.
Key Generation: Committee nodes create the encryption keys corresponding to scheduled time intervals.
Immediate Access: Encryption Keys are immediately available for external services.
Time-Locked Release: Solver nodes compute and release the corresponding decryption keys after pre-determined delays.
Verification: Verifier nodes continuously monitor the network operations, ensuring all nodes adhere to the protocol and maintaining fault tolerance.

Operational Lifecycle

Key States and Transitions

Last updated