首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Verifiable (t, n) Threshold Signature Scheme Based on Elliptic Curve
作者姓名:WANG Hua-qun  ZHAO Jun-xi  ZHANG Li-jun .Information Engineering
作者单位:WANG Hua-qun1,ZHAO Jun-xi2,ZHANG Li-jun 11.Information Engineering Department,Nanjing University of Posts and Telecommunications,Nanjing 210003,Jiangshu,China; 2.Applied Mathematics and Physics Department,Nanjing University of Posts and Telecommunications,Nanjing 210003,Jiangshu,China
基金项目:SupportedbytheNationalNaturalScienceFoundationofChina(10171087)
摘    要:0 IntroductionI t’s very important to assure the security of the keys inmany applied fields. A critical technique to prevent the keyfrom leaking is to adopt the threshold cryptosystem. It wasfirst introduced by Shamir in 19791] and by Desmedt in19872]. In this system, each group, instead of each groupmember, publishes a single group public key. The received ci phertext can only be deciphered properly when the number ofparticipating group members is larger than or equal …


Verifiable (t, n) Threshold Signature Scheme Based on Elliptic Curve
Abstract:Based on the difficulty of solving the ECDLP (elliptic curve discrete logarithm problem) on the finite field, we present a (t, n) threshold signature scheme and a verifiable key agreement scheme without trusted party. Applying a modified elliptic curve signature equation, we get a more efficient signature scheme than the existing ECDSA (elliptic curve digital signature algorithm) from the computability and security view. Our scheme has a shorter key, faster computation, and better security.
Keywords:threshold signature  secret sharing  elliptic curve  elliptic curve discrete logarithm
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号