An Elliptic Curve Digital Signature Scheme Based on Proactive Secret Sharing

被引:0
|
作者
Guo, Ping [1 ]
Zhang, Hong [1 ]
机构
[1] Nan Jing Univ Sci & Technol, Coll Comp Sci, Nanjing, Peoples R China
关键词
digital signature; elliptic curve; proactive secret sharing;
D O I
10.1109/GCIS.2009.417
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most digital signature algorithms are based on RSA algorithm, and traditional secret sharing schemes involve the use of a mutually trusted authority to assist in the generation and distribution of shares that will allow a secret to be protected among a set of participants. In contrast, this paper describes a signature scheme based on elliptic curves and proactive secret sharing. A general protocol is discussed and several related steps of this protocol are presented. Special attention is given to mutually trusted authority-free threshold scheme. The scheme ensures that a system can provide reliable signature services even if some servers fail caused by attacks or failures.
引用
收藏
页码:523 / 525
页数:3
相关论文
共 50 条
  • [11] SECRET SHARING AND SHARED DIGITAL SIGNATURE USING ELLIPTIC CURVES
    Litcanu, Razvan
    Palasca, Silvia
    ANALELE STIINTIFICE ALE UNIVERSITATII AL I CUZA DIN IASI-SERIE NOUA-MATEMATICA, 2009, 55 (01): : 131 - 144
  • [12] Proactive Secret Sharing For Long Lived MANETs Using Elliptic Curve Cryptography
    Kumar, N. Chaitanya
    Basit, Abdul
    Singh, Priyadarshi
    Venkaiah, V. Ch.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 312 - 316
  • [13] Quantum Signature Scheme Based on Secret Sharing
    Huang, Xiu-Ju
    Li, Zhen-Zhen
    Li, Zi-Chen
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (06)
  • [14] Quantum Signature Scheme Based on Secret Sharing
    Xiu-Ju Huang
    Zhen-Zhen Li
    Zi-Chen Li
    International Journal of Theoretical Physics, 61
  • [15] Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images
    Li, Li
    Abd El-Latif, Ahmed A.
    Niu, Xiamu
    SIGNAL PROCESSING, 2012, 92 (04) : 1069 - 1078
  • [16] Improvement of Communication Traffic and Security of Proactive Secret Sharing Schemes and Combination Proactive Secret Sharing Scheme with an Asymmetric Secret Sharing Scheme
    Kaneko, Naoto
    Iwamura, Keiichi
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 13 - 18
  • [17] A Verifiable Multi-Secret Sharing Scheme with Elliptic Curve Cryptography
    Chattopadhyay, Arup Kumar
    Maitra, Paramita
    Nag, Amitava
    Saha, Himadri Nath
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1374 - 1379
  • [18] Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem
    Duo Liu
    Ping Luo
    Yi-Qi Dai
    Journal of Computer Science and Technology, 2007, 22 : 92 - 94
  • [19] Attack on digital multi-signature scheme based on elliptic curve cryptosystem
    Liu, Duo
    Luo, Ping
    Dai, Yi-Qi
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 92 - 94
  • [20] Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem
    Yang, Jen-Ho
    Chang, Chin-Chen
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 3 - +