Secure Two-Party Computation for weak Boneh-Boyen Signature

Loading...
Thumbnail Image

Date

Authors

Sečkár, M.
Ricci, S.

Advisor

Referee

Mark

Journal Title

Journal ISSN

Volume Title

Publisher

Vysoké učení technické v Brně, Fakulta elektrotechniky a komunikačních technologií

ORCID

Abstract

Secure two-party computation allows two entities to securely calculate a common result keeping their private inputs secret. By applying this to the weak Boneh-Boyen signature, a trusted third party is able to sign the user’s message (or a secret key) without knowing its content (or value). In this article, we present a C library that implements a two-party computation algorithm for generating a user’s secret key that can be used in a group signature scheme. The library provides a structured output ready to be serialized and sent over a network. We also show the computational benchmarks of the implemented algorithms. The computations on the sender’s side are relatively fast, which broadens the possibilities of deployment on constrained devices.

Description

Citation

Proceedings I of the 28st Conference STUDENT EEICT 2022: General papers. s. 145-148. ISBN 978-80-214-6029-4
https://conf.feec.vutbr.cz/eeict/index/pages/view/ke_stazeni

Document type

Peer-reviewed

Document version

Published version

Date of access to the full text

Language of document

en

Study field

Comittee

Date of acceptance

Defence

Result of defence

DOI

Endorsement

Review

Supplemented By

Referenced By

Citace PRO