Key Backup and Recovery for Resilient DID Environment

被引:0
|
作者
Kim, Jihwan [1 ]
Kim, Pyung [2 ]
Lee, Younho [3 ]
Choi, Daeseon [4 ]
机构
[1] SeoulTech, Grad Sch IT & Policy, Seoul 01811, South Korea
[2] Inje Univ, Dept Comp Sci, Gimhae 50834, South Korea
[3] SeoulTech, Dept Ind Engn, Seoul 01811, South Korea
[4] Soong Sil Univ, Dept Software, Seoul 07027, South Korea
关键词
FROST (flexible round-optimized Schnorr threshold signatures); interoperability technology of digital identification; multi-party distributed signature; universal digital wallet; key backup; key recovery; SIGNATURES;
D O I
10.3390/math12060830
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper delves into the advantages of authentication algorithms employing self-sovereign identity, highlighting a reduced communication overhead and the elimination of single points of failure. However, it acknowledges the vulnerability of digital wallets to real-world issues like loss or theft. To address these challenges, we propose an efficient key backup and recovery protocol based on the FROST threshold signature algorithm. This protocol involves trusted third parties and backup devices, ensuring secure secret key sharing and rapid key recovery. Performance evaluations, including key recovery time, demonstrate the protocol's efficiency and reliability, bolstering the overall robustness of self-sovereign identity systems.
引用
收藏
页数:15
相关论文
共 50 条
  • [11] Resilient Quantum Key Distribution (QKD)-Integrated Optical Networks With Secret-Key Recovery Strategy
    Wang, Hua
    Zhao, Yongli
    Yu, Xiaosong
    Nag, Avishek
    Ma, Zhangchao
    Wang, Jianquan
    Yan, Longchuan
    Zhang, Jie
    IEEE ACCESS, 2019, 7 : 60079 - 60090
  • [12] PC BACKUP, RECOVERY AND INSURANCE
    JOHNSTON, RE
    INFOSYSTEMS, 1984, 31 (08): : 68 - 68
  • [13] Burt: The backup and recovery tool
    Melski, E
    USENIX ASSOCIATION PROCEEDINGS OF THE THIRTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIII), 1999, : 207 - 217
  • [14] Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?
    Chaigneau, Colin
    Gilbert, Henri
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2016, 2016 (01) : 114 - 133
  • [15] An Efficient Backup-Recovery Technique to Process Large Data in Distributed Key-Value Store
    Min, Donghee
    Hwang, Taegye
    Jang, Joonhyouk
    Cho, Yookun
    Hong, Jiman
    30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, 2015, : 2072 - 2074
  • [16] Green and resilient design of telecom networks with shared backup resources
    Jalalinia, Shabnam S.
    Cavdar, Cicek
    OPTICAL SWITCHING AND NETWORKING, 2017, 23 : 97 - 107
  • [17] Online storage, cloud backup and recovery
    Stevic, Milos
    Cvejic, Radoje
    Josimovic, Ljubisa
    TECHNICS TECHNOLOGIES EDUCATION MANAGEMENT-TTEM, 2011, 6 (04): : 939 - 947
  • [18] BACKUP COMPUTERS LEAD THE WAY TO RECOVERY
    WATTS, S
    NEW SCIENTIST, 1989, 124 (1688) : 22 - 22
  • [19] BACKUP AND RECOVERY IN THE IBM INFORMATION NETWORK
    BHADRA, K
    SCHIFFMAN, SM
    AFIPS CONFERENCE PROCEEDINGS, 1983, 52 : 671 - &
  • [20] Compact Key Storage A Modern Approach to Key Backup and Delegation
    Dodis, Yevgeniy
    Jost, Daniel
    Marcedone, Antonio
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 75 - 109