Enabling Efficient Threshold Signature Computation via Java Card API
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F23%3A00131568" target="_blank" >RIV/00216224:14330/23:00131568 - isvavai.cz</a>
Result on the web
<a href="https://crocs.fi.muni.cz/_media/publications/pdf/2023-ares-dufka.pdf" target="_blank" >https://crocs.fi.muni.cz/_media/publications/pdf/2023-ares-dufka.pdf</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1145/3600160.3600180" target="_blank" >10.1145/3600160.3600180</a>
Alternative languages
Result language
angličtina
Original language name
Enabling Efficient Threshold Signature Computation via Java Card API
Original language description
Threshold signatures are becoming an increasingly popular method of signing key protection, primarily due to their ability to produce signatures that require the cooperation of multiple parties yet appear indistinguishable from a regular signature. This unique feature allows for their easy integration with existing systems, making them highly desirable in applications like national identity systems and transaction authorization, where they are being gradually deployed; their growing importance is further attested by NIST’s recently initiated efforts to standardize threshold schemes [19]. An issue often encountered in the deployment of threshold schemes is that their execution is not supported by current secure hardware, which is necessary for the secure handling of secrets, as storing the shares in regular memory puts them at an increased risk of compromise. This raises the question of whether it is possible to run state-of-the-art threshold protocols with current secure hardware that we attempt to answer for cryptographic smartcards. We analyzed algorithms available on smartcards with the Java Card platform and repurposed them to construct operations needed in threshold protocols. We use these derived operations to implement , a state-of-the-art threshold signature scheme currently in a standardization process, making it the first open smartcard implementation of a threshold protocol supporting an arbitrary threshold. We demonstrate the practicality of this approach on the latest smartcards with no requirement for proprietary libraries.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
—
OECD FORD branch
10200 - Computer and information sciences
Result continuities
Project
<a href="/en/project/VJ01010084" target="_blank" >VJ01010084: Digital evidence in criminal proceedings</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2023
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Proceedings of the 18th International Conference on Availability, Reliability and Security
ISBN
9798400707728
ISSN
—
e-ISSN
—
Number of pages
10
Pages from-to
1-10
Publisher name
Association for Computing Machinery
Place of publication
Benevento, Italy
Event location
Benevento, Italy
Event date
Jan 1, 2023
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
001122662500002