DocumentCode :
2261191
Title :
Verifiable threshold cryptosystems based on elliptic curve
Author :
Yiliang, Han ; Xiaoyuan, Yang ; Jun, Sun ; Delong, LI
Author_Institution :
Dept. of Electron. Technol., Eng. Coll. of Armed Police Force, Xi´´an, China
fYear :
2003
fDate :
20-23 Oct. 2003
Firstpage :
334
Lastpage :
337
Abstract :
Verifiable (t, n) threshold ECSA (elliptic curve signature verification) signature algorithm and verifiable (t, n) threshold ECES (elliptic curve encrypt scheme) encryption algorithm are presented according to a secret sharing scheme for elliptic curve using Lagrange polynomial interpolation as access structure. A group of n players share an ECC (elliptic curve cryptosystem) secret key. Every qualified subset of the group, including t out of n players, could recover the secret key, so that they can sign and decrypt as well as the whole group, while no subset of t-1 players can accomplish it. The algorithms are perfect and secure verifiable secret shared schemes and their complexity is less than the same schemes based on DLP.
Keywords :
communication complexity; cryptography; interpolation; message authentication; polynomials; ECC; ECES; ECSA; Lagrange polynomial interpolation; elliptic curve cryptosystem; elliptic curve encrypt scheme; elliptic curve signature verification; encryption algorithm; secret key; secret sharing; signature algorithm; verifiable threshold cryptosystems; Computer networks; Elliptic curve cryptography; Elliptic curves; Galois fields; Interpolation; Lagrangian functions; Polynomials; Protection; Public key; Sun;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Networks and Mobile Computing, 2003. ICCNMC 2003. 2003 International Conference on
Print_ISBN :
0-7695-2033-2
Type :
conf
DOI :
10.1109/ICCNMC.2003.1243064
Filename :
1243064
Link To Document :
بازگشت