Publication result detail

Lattice-based Threshold Signature Implementation for Constrained Devices

DOBIÁŠ, P.; RICCI, S.; DZURENDA, P.; MALINA, L.; SNETKOV, N.

Original Title

Lattice-based Threshold Signature Implementation for Constrained Devices

English Title

Lattice-based Threshold Signature Implementation for Constrained Devices

Type

Paper in proceedings (conference paper)

Original Abstract

Threshold signatures have gained increased attention especially due to their recent applications in blockchain technologies. In fact, current cryptocurrencies such as Bitcoin, and Cardano started to support multi-signature transactions. Even if the Schnorr-based threshold signatures improve the blockchain's privacy and scalability, these schemes do not provide post-quantum security. In this paper, we propose the optimization of the DS2 lattice-based $(n,n)$-threshold signature scheme and present its practical implementation. Moreover, we evaluate our optimized implementation of the DS2 scheme on different platforms. The results demonstrate that our implementation is easily portable and executable on constrained devices based on ARM Cortex-A53, ARM Cortex-M3, and ESP32 architectures.

English abstract

Threshold signatures have gained increased attention especially due to their recent applications in blockchain technologies. In fact, current cryptocurrencies such as Bitcoin, and Cardano started to support multi-signature transactions. Even if the Schnorr-based threshold signatures improve the blockchain's privacy and scalability, these schemes do not provide post-quantum security. In this paper, we propose the optimization of the DS2 lattice-based $(n,n)$-threshold signature scheme and present its practical implementation. Moreover, we evaluate our optimized implementation of the DS2 scheme on different platforms. The results demonstrate that our implementation is easily portable and executable on constrained devices based on ARM Cortex-A53, ARM Cortex-M3, and ESP32 architectures.

Keywords

Threshold Signature; Lattice-based Cryptography; Software Implementation; Dilithium; Homomorphic Commitment; Embedded Systems; Constrained Devices

Key words in English

Threshold Signature; Lattice-based Cryptography; Software Implementation; Dilithium; Homomorphic Commitment; Embedded Systems; Constrained Devices

Authors

DOBIÁŠ, P.; RICCI, S.; DZURENDA, P.; MALINA, L.; SNETKOV, N.

RIV year

2024

Released

10.07.2023

Publisher

Science and Technology Publications

ISBN

978-989-758-666-8

Book

Proceedings of the 20th International Conference on Security and Cryptography (SECRYPT 2023)

Pages from

724

Pages to

730

Pages count

7

URL

Full text in the Digital Library

BibTex

@inproceedings{BUT184190,
  author="Patrik {Dobiáš} and Sara {Ricci} and Petr {Dzurenda} and Lukáš {Malina} and nikita {snetkov}",
  title="Lattice-based Threshold Signature Implementation for Constrained Devices",
  booktitle="Proceedings of the 20th International Conference on Security and Cryptography (SECRYPT 2023)",
  year="2023",
  pages="724--730",
  publisher="Science and Technology Publications",
  doi="10.5220/0012112700003555",
  isbn="978-989-758-666-8",
  url="https://www.scitepress.org/PublicationsDetail.aspx?ID=z3gjVniFpUg=&t=1"
}

Documents