Skip to content

Lattice-Based Threshold Signature Implementation for Constrained Devices

    Abstract: Threshold signatures have gained increased attention especially due to their recent applications in blockchain technologies. In fact, current cryptocurrencies such as Bitcoin, and Cardano started to support multi-signature transactions. Even if the Schnorr-based threshold signatures improve the blockchain’s privacy and scalability, these schemes do not provide post-quantum security. In this paper, we propose the optimization of the DS2 lattice-based (n,n)-threshold signature scheme and present its practical implementation. Moreover, we evaluate our optimized implementation of the DS2 scheme on different platforms. The results demonstrate that our implementation is easily portable and executable on constrained devices based on ARM Cortex-A53, ARM Cortex-M3, and ESP32 architectures.

    Authors: Patrik Dobias, Sara Ricci, Petr Dzurenda, Lukas Malina, Nikita Snetkov

    Published: Proceedings of the 20th International Conference on Security and Cryptography (SECRYPT 2023). Science and Technology Publications. 2023. ISBN: 978-989-758-666-8.p. 724-730.

    Full Publication

    DOI: http://dx.doi.org/10.5220/0012112700003555