Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Experimental Analysis of the Recent Key Recovery Protocol with respect to Commitment Schemes

Full metadata record
DC Field Value Language
dc.contributor.authorChoi, Seongbong-
dc.contributor.authorSon, Yongseok-
dc.contributor.authorPaek, Jeongyeup-
dc.contributor.authorLee, Hyung Tae-
dc.date.accessioned2024-03-18T04:30:22Z-
dc.date.available2024-03-18T04:30:22Z-
dc.date.issued2024-01-
dc.identifier.issn2162-1233-
dc.identifier.urihttps://scholarworks.bwise.kr/cau/handle/2019.sw.cau/72880-
dc.description.abstractRecently, Kim et al. proposed a key recovery protocol for (t, n)-threshold ECDSA schemes that enables a user who lost his secret share to recover with the aid of other t users among n users [1]. In their protocol, a commitment scheme was employed to commit to messages, but they provided implementation results of their protocol by employing the Feldman commitment scheme only. In this paper, we examine the efficiency of their protocol with respect to commitment schemes by implementing them. More precisely, we implement the protocol by employing hash-based and Pedersen commitment schemes each as well as the Feldman commitment scheme. Our experimental results show that the hash-based commitment scheme provides the most efficient protocol than other commitment schemes. For example, when t = 3 with 128-bit security, the protocol with the hash-based commitment requires 0.485 ms in total for all computations, while the protocols with Feldman and Pedersen commitment schemes take 7.713 ms and 15.228 ms in total, which improve by factors of about 15.90 and 31.40, respectively. © 2023 IEEE.-
dc.format.extent6-
dc.language영어-
dc.language.isoENG-
dc.publisherIEEE Computer Society-
dc.titleExperimental Analysis of the Recent Key Recovery Protocol with respect to Commitment Schemes-
dc.typeArticle-
dc.identifier.doi10.1109/ICTC58733.2023.10392697-
dc.identifier.bibliographicCitationInternational Conference on ICT Convergence, v.2023 14th, pp 669 - 674-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-85184622309-
dc.citation.endPage674-
dc.citation.startPage669-
dc.citation.titleInternational Conference on ICT Convergence-
dc.citation.volume2023 14th-
dc.type.docTypeConference paper-
dc.publisher.location미국-
dc.subject.keywordAuthorcommitment schemes-
dc.subject.keywordAuthorhash-based commitment-
dc.subject.keywordAuthorKey recovery protocol-
dc.subject.keywordAuthorPedersen commitment-
dc.subject.keywordAuthorthreshold ECDSA-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Software > School of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Hyungtae photo

Lee, Hyungtae
소프트웨어대학 (소프트웨어학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE