Lattice-based Multisignature Optimization for RAM Constrained Devices
dc.contributor.author | Ricci, Sara | cs |
dc.contributor.author | Shapoval, Vladyslav | cs |
dc.contributor.author | Dzurenda, Petr | cs |
dc.contributor.author | Roenne, Peter | cs |
dc.contributor.author | Oupicky, Jan | cs |
dc.contributor.author | Malina, Lukáš | cs |
dc.date.accessioned | 2025-02-18T11:36:14Z | |
dc.date.available | 2025-02-18T11:36:14Z | |
dc.date.issued | 2024-07-30 | cs |
dc.description.abstract | In the era of growing threats posed by the development of quantum computers, ensuring the security of electronic services has become fundamental. The ongoing standardization process led by the National Institute of Standards and Technology (NIST) emphasizes the necessity for quantum-resistant security measures. However, the implementation of Post-Quantum Cryptographic (PQC) schemes, including advanced schemes such as threshold signatures, faces challenges due to their large key sizes and high computational complexity, particularly on constrained devices. This paper introduces two microcontroller-tailored optimization approaches, focusing on enhancing the DS2 threshold signature scheme. These optimizations aim to reduce memory consumption while maintaining security strength, specifically enabling the implementation of DS2 on microcontrollers with only 192 KB of RAM. Experimental results and security analysis demonstrate the efficacy and practicality of our solution, facilitating the deployment of DS2 threshold signatures on resource-constrained microcontrollers. | en |
dc.format | text | cs |
dc.format.extent | 1-10 | cs |
dc.format.mimetype | application/pdf | cs |
dc.identifier.citation | ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security. 2024, p. 1-10. | en |
dc.identifier.doi | 10.1145/3664476.3670461 | cs |
dc.identifier.isbn | 979-8-4007-1718-5 | cs |
dc.identifier.orcid | 0000-0003-0842-4951 | cs |
dc.identifier.orcid | 0000-0002-4366-3950 | cs |
dc.identifier.orcid | 0000-0002-7208-2514 | cs |
dc.identifier.other | 189220 | cs |
dc.identifier.researcherid | R-6057-2018 | cs |
dc.identifier.researcherid | AAC-8713-2019 | cs |
dc.identifier.researcherid | E-2174-2018 | cs |
dc.identifier.scopus | 57126826900 | cs |
dc.identifier.scopus | 56418733600 | cs |
dc.identifier.scopus | 49863792100 | cs |
dc.identifier.uri | https://hdl.handle.net/11012/250056 | |
dc.language.iso | en | cs |
dc.publisher | Association for Computing Machinery | cs |
dc.relation.ispartof | ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security | cs |
dc.relation.uri | https://dl.acm.org/doi/10.1145/3664476.3670461 | cs |
dc.rights | Creative Commons Attribution 4.0 International | cs |
dc.rights.access | openAccess | cs |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | cs |
dc.subject | Lattice-based cryptography | en |
dc.subject | Dilithium | en |
dc.subject | threshold signature | en |
dc.subject | microcontroller | en |
dc.subject | memory optimization | en |
dc.subject | random access memory | en |
dc.subject | RAM | en |
dc.title | Lattice-based Multisignature Optimization for RAM Constrained Devices | en |
dc.type.driver | conferenceObject | en |
dc.type.status | Peer-reviewed | en |
dc.type.version | publishedVersion | en |
eprints.grantNumber | info:eu-repo/grantAgreement/MV0/VJ/VJ03030014 | cs |
sync.item.dbid | VAV-189220 | en |
sync.item.dbtype | VAV | en |
sync.item.insts | 2025.02.18 12:36:13 | en |
sync.item.modts | 2025.02.13 15:32:06 | en |
thesis.grantor | Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií. Ústav telekomunikací | cs |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 3664476.3670461.pdf
- Size:
- 2.23 MB
- Format:
- Adobe Portable Document Format
- Description:
- file 3664476.3670461.pdf