ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem

被引:2
|
作者
Su, PC
Chang, HKC
Lu, EH
机构
[1] Chang Gung Univ, Grad Inst Business Adm, Taoyuan 333, Taiwan
[2] Chang Gung Univ, Dept Elect Engn, Taoyuan 333, Taiwan
关键词
ID-based; threshold digital signature; elliptic curve cryptography;
D O I
10.1016/j.amc.2004.06.033
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We present three identification group-oriented (t,n) threshold digital signature schemes based on the elliptic curve discrete logarithm problem, with a view to optimizing these techniques for implementation within a network. By employing these schemes, any t out of n users in a group can represent this group to sign the group signature. This paper has the following five notable advantages: (1) This work demonstrates the feasibility of constructing a fast and extremely secure user identification system. (2) Any group signature can be mutually generated by at least t-group member. (3) The signature verification process is simplified because there is only one group public key required. (4) The group signature can be verified by any outsider. (5) These schemes offer higher speeds, lower power consumption, smaller bandwidth requirements, and smaller certificate sizes than other existing public.-key schemes. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:757 / 772
页数:16
相关论文
共 50 条
  • [31] Recent progress on the elliptic curve discrete logarithm problem
    Steven D. Galbraith
    Pierrick Gaudry
    Designs, Codes and Cryptography, 2016, 78 : 51 - 72
  • [32] The Xedni Calculus and the Elliptic Curve Discrete Logarithm Problem
    Joseph H. Silverman
    Designs, Codes and Cryptography, 2000, 20 : 5 - 40
  • [33] Partial Lifting and the Elliptic Curve Discrete Logarithm Problem
    Qi Cheng
    Ming-Deh Huang
    Algorithmica, 2006, 46 : 59 - 68
  • [34] Partial lifting and the elliptic curve discrete logarithm problem
    Cheng, Qi
    Huang, Ming-Deh
    ALGORITHMICA, 2006, 46 (01) : 59 - 68
  • [35] Elliptic curve blind digital signature schemes
    You, L
    Yang, YX
    Wen, QY
    CHINESE JOURNAL OF ELECTRONICS, 2003, 12 (03): : 411 - 414
  • [36] A new threshold group signature scheme based on discrete logarithm problem
    Li, Fengyin
    Yu, Jiguo
    Ju, Hongwei
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 1176 - +
  • [37] Known Signature Attack of ID-based Multisignature Schemes
    Yang, Wu-Chuan
    Jhou, Jhih-Syue
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 341 - +
  • [38] Lifting elliptic curves and solving the elliptic curve discrete logarithm problem
    Huang, MDA
    Kueh, KL
    Tan, KS
    ALGORITHMIC NUMBER THEORY, 2000, 1838 : 377 - 384
  • [39] Provable security of ID-based proxy signature schemes
    Gu, CX
    Zhu, YF
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1277 - 1286
  • [40] Breaking an ID-based encryption based on discrete logarithm and factorization problems
    Tan, Chik How
    Prabowo, Theo Fanuela
    Duc-Phong Le
    INFORMATION PROCESSING LETTERS, 2016, 116 (02) : 116 - 119