An Elliptic Curve Digital Signature Scheme Based on Proactive Secret Sharing

被引:0
|
作者
Guo, Ping [1 ]
Zhang, Hong [1 ]
机构
[1] Nan Jing Univ Sci & Technol, Coll Comp Sci, Nanjing, Peoples R China
关键词
digital signature; elliptic curve; proactive secret sharing;
D O I
10.1109/GCIS.2009.417
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most digital signature algorithms are based on RSA algorithm, and traditional secret sharing schemes involve the use of a mutually trusted authority to assist in the generation and distribution of shares that will allow a secret to be protected among a set of participants. In contrast, this paper describes a signature scheme based on elliptic curves and proactive secret sharing. A general protocol is discussed and several related steps of this protocol are presented. Special attention is given to mutually trusted authority-free threshold scheme. The scheme ensures that a system can provide reliable signature services even if some servers fail caused by attacks or failures.
引用
收藏
页码:523 / 525
页数:3
相关论文
共 50 条
  • [22] A Secure Elliptic Curve Digital Signature Scheme for Embedded Devices
    Wajih, El Hadj Youssef
    Mohsen, Machhout
    Rached, Tourki
    SCS: 2008 2ND INTERNATIONAL CONFERENCE ON SIGNALS, CIRCUITS AND SYSTEMS, 2008, : 68 - 73
  • [23] Secure and Efficient Secret Sharing Scheme with General Access Structures Based on Elliptic Curve and Pairing
    V. P. Binu
    A. Sreekumar
    Wireless Personal Communications, 2017, 92 : 1531 - 1543
  • [24] Secure and Efficient Secret Sharing Scheme with General Access Structures Based on Elliptic Curve and Pairing
    Binu, V. P.
    Sreekumar, A.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 92 (04) : 1531 - 1543
  • [25] Threshold Signature Scheme Based on Modular Secret Sharing
    Xie, Qi
    Shen, Zhonghua
    Yu, Xiuyuan
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1003 - +
  • [26] A proactive secret sharing scheme based on Chinese remainder theorem
    Keju MENG
    Fuyou MIAO
    Yu NING
    Wenchao HUANG
    Yan XIONG
    ChinChen CHANG
    Frontiers of Computer Science, 2021, (02) : 127 - 136
  • [27] A proactive quantum secret sharing scheme based on GHZ state
    Qin, Huawang
    Zhu, Xiaohua
    Dai, Yuewei
    MODERN PHYSICS LETTERS B, 2015, 29 (27):
  • [28] A proactive secret sharing scheme based on Chinese remainder theorem
    Keju Meng
    Fuyou Miao
    Yu Ning
    Wenchao Huang
    Yan Xiong
    Chin-Chen Chang
    Frontiers of Computer Science, 2021, 15
  • [29] A proactive secret sharing scheme based on Chinese remainder theorem
    Meng, Keju
    Miao, Fuyou
    Ning, Yu
    Huang, Wenchao
    Xiong, Yan
    Chang, Chin-Chen
    FRONTIERS OF COMPUTER SCIENCE, 2021, 15 (02)
  • [30] A novel proactive secret image sharing scheme based on LISS
    Cheng Guo
    Huan Zhang
    Zhangjie Fu
    Bin Feng
    Mingchu Li
    Multimedia Tools and Applications, 2018, 77 : 19569 - 19590