Distributed Signing Protocol for Tamper-Resistant Module
نویسندگان
چکیده
In this paper, we present a protocol for a ID-based signature scheme using a tamperresistant module that holds a private key for signing. This is a distributed-signature scheme, and a computation using a private key is executed on the tamper-resistant module (TRM), with the remaining computations performed on a host PC. The scheme is secure against both passive and active adversaries, even those that can corrupt the host PC. The computational complexity on the TRM is reduced to one multiplication, one addition, and one symmetric key decryption, and the transaction data size is small.
منابع مشابه
Votinbox - a voting system based on smart cards
The complexity of voting procedures, and their variations from country to country, make it challenging to design a secure electronic voting system. In most of the usual proposals, the security of the system relies mainly on a blackbox voting machine. Meanwhile, the most advanced proposals base their security arguments on (complicated) cryptographic protocols, e.g. blind signatures or homomorphi...
متن کاملHow to fit cryptographic e-voting into smart cards
The complexity of voting procedures make it challenging to design a secure electronic voting system. In many proposals, the security of the system relies mainly on a black box voting machine. Meanwhile, the most advanced proposals base their security arguments on (complicated) cryptographic protocols, e.g. blind signatures or homomorphic schemes. Canard and Traoré proposed cryptographic primiti...
متن کاملSmart Cards in Interaction: Towards Trustworthy Digital Signatures
We present approaches to raise the security level in the process of electronic signature creation by shifting as many tasks as possible involved in digitally signing data into a tamper-resistant and trustworthy smart card. We describe the fundamental technical principles our approach is based on, illustrate resulting design options, and compare the security of our approach with traditional elec...
متن کاملA Collusion-Resistant Distributed Agent-Based Signature Delegation (CDASD) Protocol for E-Commerce Applications
Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform is signing digital signatures on a remote untrustworthy service host that is beyond the control of the agent host. This service host may treat the mobile agents unfairly, i.e. acc...
متن کامل