|
This article is cited in 1 scientific paper (total in 1 paper)
Secure implementation of digital signature using semi-trusted computational core
E. K. Alekseev, L. R. Ahmetzyanova, A. A. Bozhko, S. V. Smyshlyaev LLC «Crypto-Pro», Moscow
Abstract:
We consider the problem of developing a protocol of interaction between software and hardware used by digital signature mechanisms and hardware tokens containing keys in case when such tokens may have backdoors of particular kind. We propose a relevant adversary model and develop a scheme of the protocol for which we prove required security properties.
Key words:
GOST R 34.10-2012, semi-trusted environment, signature, zero-knowledge proof, adversary model.
Received 31.VIII.2021
Citation:
E. K. Alekseev, L. R. Ahmetzyanova, A. A. Bozhko, S. V. Smyshlyaev, “Secure implementation of digital signature using semi-trusted computational core”, Mat. Vopr. Kriptogr., 12:4 (2021), 5–23
Linking options:
https://www.mathnet.ru/eng/mvk379https://doi.org/10.4213/mvk379 https://www.mathnet.ru/eng/mvk/v12/i4/p5
|
Statistics & downloads: |
Abstract page: | 362 | Full-text PDF : | 137 | References: | 40 | First page: | 16 |
|