Experimental Analysis of the Recent Key Recovery Protocol with respect to Commitment Schemes
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Seongbong | - |
dc.contributor.author | Son, Yongseok | - |
dc.contributor.author | Paek, Jeongyeup | - |
dc.contributor.author | Lee, Hyung Tae | - |
dc.date.accessioned | 2024-03-18T04:30:22Z | - |
dc.date.available | 2024-03-18T04:30:22Z | - |
dc.date.issued | 2024-01 | - |
dc.identifier.issn | 2162-1233 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/72880 | - |
dc.description.abstract | Recently, Kim et al. proposed a key recovery protocol for (t, n)-threshold ECDSA schemes that enables a user who lost his secret share to recover with the aid of other t users among n users [1]. In their protocol, a commitment scheme was employed to commit to messages, but they provided implementation results of their protocol by employing the Feldman commitment scheme only. In this paper, we examine the efficiency of their protocol with respect to commitment schemes by implementing them. More precisely, we implement the protocol by employing hash-based and Pedersen commitment schemes each as well as the Feldman commitment scheme. Our experimental results show that the hash-based commitment scheme provides the most efficient protocol than other commitment schemes. For example, when t = 3 with 128-bit security, the protocol with the hash-based commitment requires 0.485 ms in total for all computations, while the protocols with Feldman and Pedersen commitment schemes take 7.713 ms and 15.228 ms in total, which improve by factors of about 15.90 and 31.40, respectively. © 2023 IEEE. | - |
dc.format.extent | 6 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | IEEE Computer Society | - |
dc.title | Experimental Analysis of the Recent Key Recovery Protocol with respect to Commitment Schemes | - |
dc.type | Article | - |
dc.identifier.doi | 10.1109/ICTC58733.2023.10392697 | - |
dc.identifier.bibliographicCitation | International Conference on ICT Convergence, v.2023 14th, pp 669 - 674 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-85184622309 | - |
dc.citation.endPage | 674 | - |
dc.citation.startPage | 669 | - |
dc.citation.title | International Conference on ICT Convergence | - |
dc.citation.volume | 2023 14th | - |
dc.type.docType | Conference paper | - |
dc.publisher.location | 미국 | - |
dc.subject.keywordAuthor | commitment schemes | - |
dc.subject.keywordAuthor | hash-based commitment | - |
dc.subject.keywordAuthor | Key recovery protocol | - |
dc.subject.keywordAuthor | Pedersen commitment | - |
dc.subject.keywordAuthor | threshold ECDSA | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
84, Heukseok-ro, Dongjak-gu, Seoul, Republic of Korea (06974)02-820-6194
COPYRIGHT 2019 Chung-Ang University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.