Distributed Signing Protocol for Tamper-Resistant Module

نویسندگان

  • Shinsaku Kiyomoto
  • Tsukasa Ishiguro
چکیده

In this paper, we present a protocol for a ID-based signature scheme using a tamperresistant module that holds a private key for signing. This is a distributed-signature scheme, and a computation using a private key is executed on the tamper-resistant module (TRM), with the remaining computations performed on a host PC. The scheme is secure against both passive and active adversaries, even those that can corrupt the host PC. The computational complexity on the TRM is reduced to one multiplication, one addition, and one symmetric key decryption, and the transaction data size is small.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Votinbox - a voting system based on smart cards

The complexity of voting procedures, and their variations from country to country, make it challenging to design a secure electronic voting system. In most of the usual proposals, the security of the system relies mainly on a blackbox voting machine. Meanwhile, the most advanced proposals base their security arguments on (complicated) cryptographic protocols, e.g. blind signatures or homomorphi...

متن کامل

How to fit cryptographic e-voting into smart cards

The complexity of voting procedures make it challenging to design a secure electronic voting system. In many proposals, the security of the system relies mainly on a black box voting machine. Meanwhile, the most advanced proposals base their security arguments on (complicated) cryptographic protocols, e.g. blind signatures or homomorphic schemes. Canard and Traoré proposed cryptographic primiti...

متن کامل

Smart Cards in Interaction: Towards Trustworthy Digital Signatures

We present approaches to raise the security level in the process of electronic signature creation by shifting as many tasks as possible involved in digitally signing data into a tamper-resistant and trustworthy smart card. We describe the fundamental technical principles our approach is based on, illustrate resulting design options, and compare the security of our approach with traditional elec...

متن کامل

A Collusion-Resistant Distributed Agent-Based Signature Delegation (CDASD) Protocol for E-Commerce Applications

Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform is signing digital signatures on a remote untrustworthy service host that is beyond the control of the agent host. This service host may treat the mobile agents unfairly, i.e. acc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013