Skip to main content


This sub section contains documentation on the cryptographic techniques that Medusa is using. It first introduces in details the notion of threshold network and exactly what scheme is being used by Medusa. It then proceeds to show the exact operations that Medusa nodes perform to reencrypt and decrypt ciphertexts.