An Elliptic Curve Digital Signature Scheme Based on Proactive Secret Sharing

被引:0
|
作者
Guo, Ping [1 ]
Zhang, Hong [1 ]
机构
[1] Nan Jing Univ Sci & Technol, Coll Comp Sci, Nanjing, Peoples R China
关键词
digital signature; elliptic curve; proactive secret sharing;
D O I
10.1109/GCIS.2009.417
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most digital signature algorithms are based on RSA algorithm, and traditional secret sharing schemes involve the use of a mutually trusted authority to assist in the generation and distribution of shares that will allow a secret to be protected among a set of participants. In contrast, this paper describes a signature scheme based on elliptic curves and proactive secret sharing. A general protocol is discussed and several related steps of this protocol are presented. Special attention is given to mutually trusted authority-free threshold scheme. The scheme ensures that a system can provide reliable signature services even if some servers fail caused by attacks or failures.
引用
收藏
页码:523 / 525
页数:3
相关论文
共 50 条
  • [31] A novel proactive secret image sharing scheme based on LISS
    Guo, Cheng
    Zhang, Huan
    Fu, Zhangjie
    Feng, Bin
    Li, Mingchu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (15) : 19569 - 19590
  • [32] Generalized Elliptic Curve Digital Signature Chain based Authentication and Key Agreement Scheme
    Zhang Li-hua
    Zhang Li-ping
    Bai Er-fei
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 1503 - +
  • [33] New self certified proxy digital signature scheme based on elliptic curve cryptosystem
    Xiao, Youan
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 723 - 726
  • [34] Zero Knowledge Proof in Secret Sharing Scheme Using Elliptic Curve Cryptography
    Sardar, Anususya
    Rao, Subba Y., V
    RukmaRekha, N.
    GLOBAL TRENDS IN COMPUTING AND COMMUNICATION SYSTEMS, PT 1, 2012, 269 : 220 - 226
  • [35] A Zero-Knowledge Proof of Digital Signature Scheme Based on the Elliptic Curve Cryptosystem
    Qi, Chengming
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 612 - 615
  • [36] Limited proxy signature scheme based on elliptic curve
    Wang, Xiaoming
    Fu, Fangwei
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2002, 24 (12): : 1825 - 1828
  • [37] A General Threshold Signature Scheme Based on Elliptic Curve
    Shang, Yulian
    Wang, Xiujuan
    Li, Yujuan
    Zhang, Yufei
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 89 - 92
  • [38] A threshold signature scheme based on the elliptic curve cryptosystem
    Chen, TS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) : 1119 - 1134
  • [39] Anonymous proxy signature scheme based on elliptic curve
    Zhu, Bao-Ping
    Chen, Shi-Yu
    Zhu, Jing
    Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2012, 36 (SUPPL.1): : 100 - 104
  • [40] Authenticated secret session key using elliptic curve digital signature algorithm
    Mehibel, Nissa
    Hamadouche, M'hamed
    SECURITY AND PRIVACY, 2021, 4 (02)