RUS  ENG
Full version
JOURNALS // Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] // Archive

Mat. Vopr. Kriptogr., 2021 Volume 12, Issue 4, Pages 5–23 (Mi mvk379)

This article is cited in 1 paper

Secure implementation of digital signature using semi-trusted computational core

E. K. Alekseev, L. R. Ahmetzyanova, A. A. Bozhko, S. V. Smyshlyaev

LLC «Crypto-Pro», Moscow

Abstract: We consider the problem of developing a protocol of interaction between software and hardware used by digital signature mechanisms and hardware tokens containing keys in case when such tokens may have backdoors of particular kind. We propose a relevant adversary model and develop a scheme of the protocol for which we prove required security properties.

Key words: GOST R 34.10-2012, semi-trusted environment, signature, zero-knowledge proof, adversary model.

UDC: 519.719.2

Received 31.VIII.2021

DOI: 10.4213/mvk379



© Steklov Math. Inst. of RAS, 2024