Experimental Analysis of the Recent Key Recovery Protocol with respect to Commitment Schemes
- Authors
- Choi, Seongbong; Son, Yongseok; Paek, Jeongyeup; Lee, Hyung Tae
- Issue Date
- Jan-2024
- Publisher
- IEEE Computer Society
- Keywords
- commitment schemes; hash-based commitment; Key recovery protocol; Pedersen commitment; threshold ECDSA
- Citation
- International Conference on ICT Convergence, v.2023 14th, pp 669 - 674
- Pages
- 6
- Journal Title
- International Conference on ICT Convergence
- Volume
- 2023 14th
- Start Page
- 669
- End Page
- 674
- URI
- https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/72880
- DOI
- 10.1109/ICTC58733.2023.10392697
- ISSN
- 2162-1233
- Abstract
- Recently, Kim et al. proposed a key recovery protocol for (t, n)-threshold ECDSA schemes that enables a user who lost his secret share to recover with the aid of other t users among n users [1]. In their protocol, a commitment scheme was employed to commit to messages, but they provided implementation results of their protocol by employing the Feldman commitment scheme only. In this paper, we examine the efficiency of their protocol with respect to commitment schemes by implementing them. More precisely, we implement the protocol by employing hash-based and Pedersen commitment schemes each as well as the Feldman commitment scheme. Our experimental results show that the hash-based commitment scheme provides the most efficient protocol than other commitment schemes. For example, when t = 3 with 128-bit security, the protocol with the hash-based commitment requires 0.485 ms in total for all computations, while the protocols with Feldman and Pedersen commitment schemes take 7.713 ms and 15.228 ms in total, which improve by factors of about 15.90 and 31.40, respectively. © 2023 IEEE.
- Files in This Item
-
- Appears in
Collections - College of Software > School of Computer Science and Engineering > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.