ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem

被引:2
|
作者
Su, PC
Chang, HKC
Lu, EH
机构
[1] Chang Gung Univ, Grad Inst Business Adm, Taoyuan 333, Taiwan
[2] Chang Gung Univ, Dept Elect Engn, Taoyuan 333, Taiwan
关键词
ID-based; threshold digital signature; elliptic curve cryptography;
D O I
10.1016/j.amc.2004.06.033
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We present three identification group-oriented (t,n) threshold digital signature schemes based on the elliptic curve discrete logarithm problem, with a view to optimizing these techniques for implementation within a network. By employing these schemes, any t out of n users in a group can represent this group to sign the group signature. This paper has the following five notable advantages: (1) This work demonstrates the feasibility of constructing a fast and extremely secure user identification system. (2) Any group signature can be mutually generated by at least t-group member. (3) The signature verification process is simplified because there is only one group public key required. (4) The group signature can be verified by any outsider. (5) These schemes offer higher speeds, lower power consumption, smaller bandwidth requirements, and smaller certificate sizes than other existing public.-key schemes. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:757 / 772
页数:16
相关论文
共 50 条
  • [1] Blind Signature Schemes Based on the Elliptic Curve Discrete Logarithm Problem
    Popescu, Constantin
    STUDIES IN INFORMATICS AND CONTROL, 2010, 19 (04): : 397 - 402
  • [2] New Blind Signature Schemes Based on the (Elliptic Curve) Discrete Logarithm Problem
    Mala, Hamid
    Nezhadansari, Nafiseh
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2013), 2013, : 196 - 201
  • [3] ID-based digital signature scheme on the elliptic curve cryptosystem
    Chung, Yu Fang
    Huang, Kuo Hsuan
    Lai, Feipei
    Chen, Tzer Shyong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (06) : 601 - 604
  • [4] ID-Based threshold signature and mediated signature schemes
    Yu, Yong
    Yang, Bo
    Sun, Ying
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 473 - +
  • [5] Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem
    Yang, Jen-Ho
    Chang, Chin-Chen
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 3 - +
  • [6] AN ID-BASED CRYPTOSYSTEM BASED ON THE DISCRETE LOGARITHM PROBLEM
    TSUJII, S
    ITOH, T
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1989, 7 (04) : 467 - 473
  • [7] Digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem
    Tzeng, SF
    Hwang, MS
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (02) : 61 - 71
  • [8] ID-BASED CRYPTOSYSTEM USING DISCRETE LOGARITHM PROBLEM
    TSUJII, S
    ITOH, T
    KUROSAWA, K
    ELECTRONICS LETTERS, 1987, 23 (24) : 1318 - 1320
  • [9] Improvement of digital signature variants based on elliptic curve with message recovery and its discrete logarithm problem
    Shao, ZH
    COMPUTER STANDARDS & INTERFACES, 2004, 27 (01) : 61 - 69
  • [10] A Novel Untraceable Blind Signature Based on Elliptic Curve Discrete Logarithm Problem
    Jena, Debasish
    Jena, Sanjay Kumar
    Majhi, Banshidhar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (06): : 269 - 275