Distributed Signing Protocol for Tamper-Resistant Module

Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake
2014 International Journal of Security and Its Applications  
In this paper, we present a protocol for a ID-based signature scheme using a tamperresistant module that holds a private key for signing. This is a distributed-signature scheme, and a computation using a private key is executed on the tamper-resistant module (TRM), with the remaining computations performed on a host PC. The scheme is secure against both passive and active adversaries, even those that can corrupt the host PC. The computational complexity on the TRM is reduced to one
more » ... n, one addition, and one symmetric key decryption, and the transaction data size is small.
doi:10.14257/ijsia.2014.8.3.11 fatcat:ekm6ik7pb5a7lophowgnfrgs4q