All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Lattice-based Threshold Signature Implementation for Constrained Devices

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F23%3APU148657" target="_blank" >RIV/00216305:26220/23:PU148657 - isvavai.cz</a>

  • Result on the web

    <a href="https://www.scitepress.org/PublicationsDetail.aspx?ID=z3gjVniFpUg=&t=1" target="_blank" >https://www.scitepress.org/PublicationsDetail.aspx?ID=z3gjVniFpUg=&t=1</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.5220/0012112700003555" target="_blank" >10.5220/0012112700003555</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Lattice-based Threshold Signature Implementation for Constrained Devices

  • Original language description

    Threshold signatures have gained increased attention especially due to their recent applications in blockchain technologies. In fact, current cryptocurrencies such as Bitcoin, and Cardano started to support multi-signature transactions. Even if the Schnorr-based threshold signatures improve the blockchain's privacy and scalability, these schemes do not provide post-quantum security. In this paper, we propose the optimization of the DS2 lattice-based $(n,n)$-threshold signature scheme and present its practical implementation. Moreover, we evaluate our optimized implementation of the DS2 scheme on different platforms. The results demonstrate that our implementation is easily portable and executable on constrained devices based on ARM Cortex-A53, ARM Cortex-M3, and ESP32 architectures.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    20203 - Telecommunications

Result continuities

  • Project

    <a href="/en/project/VJ01010008" target="_blank" >VJ01010008: Network Cybersecurity in Post-Quantum Era</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2023

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of the 20th International Conference on Security and Cryptography (SECRYPT 2023)

  • ISBN

    978-989-758-666-8

  • ISSN

  • e-ISSN

  • Number of pages

    7

  • Pages from-to

    724-730

  • Publisher name

    Science and Technology Publications

  • Place of publication

    neuveden

  • Event location

    Rome

  • Event date

    Jul 10, 2023

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    001072829100072