New techniques for theory and practice of distributed cryptographic systems