A Threshold Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem

被引:0
|
作者
Tan, Zuowen [1 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang City 330013, Jiangxi, Peoples R China
关键词
encryption; authentication; threshold signature; elliptic curve cryptosystem;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A (t, n) threshold authenticated encryption scheme allows more than t signers to generate an authenticated cipher-text for a message and only the designated verifier can verify the message. Recently, Chung et al. [1] proposed a (t, n) threshold authenticated encryption scheme by applying a division-of-labor signature technique. However, we showed that the scheme has a design flaw. Then, we proposed a new authenticated encryption scheme based on elliptic curve cryptosystem. The new authenticated encryption scheme is more efficient.
引用
收藏
页码:11 / 14
页数:4
相关论文
共 50 条
  • [1] Practical authenticated encryption scheme based on the elliptic curve cryptosystem
    Chen, TS
    Huang, KH
    Chung, YF
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 26 (05) : 461 - 469
  • [2] Scheme of data encryption based on threshold scheme and elliptic curve cryptosystem
    Tang, Xiaodong
    [J]. Jisuanji Gongcheng/Computer Engineering, 2004, 30 (10):
  • [3] A threshold signature scheme based on the elliptic curve cryptosystem
    Chen, TS
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) : 1119 - 1134
  • [4] A division-of-labor-signature (t, n) threshold-authenticated encryption scheme with message linkage based on the elliptic curve cryptosystem
    Chen, TS
    Huang, KH
    Chung, YF
    [J]. 2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 106 - 112
  • [5] A secure authenticated image encryption scheme based on elliptic curve cryptography
    Jnana Ramakrishna, Ch.
    Bharath Kalyan Reddy, D.
    Amritha, P.P.
    Lakshmy, K.V.
    Sachnev, Vasily
    [J]. International Journal of Computers and Applications, 2024, 46 (03) : 184 - 193
  • [6] Method of constructing elliptic curve authenticated encryption scheme
    Zhao, ZM
    Liu, FY
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 146 - 151
  • [7] Efficient Dynamic Threshold Group Signature Scheme Based on Elliptic Curve Cryptosystem
    夏祥胜
    洪帆
    耿永军
    崔国华
    [J]. Railway Engineering Science, 2008, (01) : 18 - 23
  • [8] Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing
    Peng, CG
    Li, X
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1136 - 1139
  • [9] A Highly Efficient Threshold Key Escrow Scheme Based on Elliptic Curve Cryptosystem
    Zhang, WenJuan
    Yu, MeiSheng
    [J]. ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 2, 2008, : 527 - 532
  • [10] (t, n) Threshold group signature scheme based on elliptic curve cryptosystem
    School of Electr. and Inf. Eng., Dalian Univ. of Technol., Dalian 116024, China
    [J]. Dalian Ligong Daxue Xuebao, 2007, 3 (429-432):