D 2023

Enabling Efficient Threshold Signature Computation via Java Card API

DUFKA, Antonín and Petr ŠVENDA

Basic information

Original name

Enabling Efficient Threshold Signature Computation via Java Card API

Authors

DUFKA, Antonín (203 Czech Republic, belonging to the institution) and Petr ŠVENDA (203 Czech Republic, belonging to the institution)

Edition

Benevento, Italy, Proceedings of the 18th International Conference on Availability, Reliability and Security, p. 1-10, 10 pp. 2023

Publisher

Association for Computing Machinery

Other information

Language

English

Type of outcome

Stať ve sborníku

Field of Study

10200 1.2 Computer and information sciences

Country of publisher

Italy

Confidentiality degree

není předmětem státního či obchodního tajemství

Publication form

electronic version available online

RIV identification code

RIV/00216224:14330/23:00131568

Organization unit

Faculty of Informatics

ISBN

979-8-4007-0772-8

UT WoS

001122662500002

Keywords in English

threshold cryptography; Java Card; elliptic curves; Schnorr signatures; smartcards

Tags

International impact, Reviewed
Změněno: 7/4/2024 23:18, RNDr. Pavel Šmerk, Ph.D.

Abstract

V originále

Threshold signatures are becoming an increasingly popular method of signing key protection, primarily due to their ability to produce signatures that require the cooperation of multiple parties yet appear indistinguishable from a regular signature. This unique feature allows for their easy integration with existing systems, making them highly desirable in applications like national identity systems and transaction authorization, where they are being gradually deployed; their growing importance is further attested by NIST’s recently initiated efforts to standardize threshold schemes [19]. An issue often encountered in the deployment of threshold schemes is that their execution is not supported by current secure hardware, which is necessary for the secure handling of secrets, as storing the shares in regular memory puts them at an increased risk of compromise. This raises the question of whether it is possible to run state-of-the-art threshold protocols with current secure hardware that we attempt to answer for cryptographic smartcards. We analyzed algorithms available on smartcards with the Java Card platform and repurposed them to construct operations needed in threshold protocols. We use these derived operations to implement , a state-of-the-art threshold signature scheme currently in a standardization process, making it the first open smartcard implementation of a threshold protocol supporting an arbitrary threshold. We demonstrate the practicality of this approach on the latest smartcards with no requirement for proprietary libraries.

Links

MUNI/A/1389/2022, interní kód MU
Name: Aplikovaný výzkum na FI: Bezpečnost počítačových systémů, softwarových architektur kritických infrastruktur s forenzními aspekty, zpracování dat pokročilých sensorů a algoritmy plánování v dopravě a logistice
Investor: Masaryk University
VJ01010084, research and development project
Name: Elektronické důkazy v  trestním řízení
Investor: Ministry of the Interior of the CR