DocumentCode :
430962
Title :
An efficient threshold group signature scheme
Author :
Chen, Tzer-Shyong ; Hsiao, Tsung-Chih ; Chen, Tzer-Long
Author_Institution :
Dept. of Inf. Manage., Tung-Hai Univ., Taiwan
Volume :
B
fYear :
2004
fDate :
21-24 Nov. 2004
Firstpage :
13
Abstract :
Globalization of the Internet has boosted electronic information exchange on both the personal and business levels. The popularity turned information communication and secure Internet transactions, which require the verification of digital signatures and identities, into a hot issue. Most existing digital signature schemes are based on the public key system of RSA and ElGamal. Security thus depends on solving factorization and the discrete logarithm. However, the encryption-decryption key of the RSA is too large and the signature authentication of ElGamal takes too long, making this method unsuitable for certain systems. Additionally, the superior security and efficiency of the elliptic curve cryptosystem (ECC) provides an imperative application foreground. This study integrates the short secret key characteristic of the elliptic curve cryptosystem and the (t,n) threshold method to create a signature scheme with simultaneous signing. The distinguishing feature of the proposed scheme is that the threshold value denotes the minimum number of members required to produce a valid group signature. All message recipients then can verify the signature.
Keywords :
Internet; business communication; digital signatures; globalisation; handwriting recognition; public key cryptography; telecommunication security; ECC; ElGamal; Internet transaction security; RSA; business level; digital signature verification; discrete logarithm; electronic information exchange; elliptic curve cryptosystem; encryption-decryption key; factorization; globalization; group signature scheme; public key system; signature authentication; Authentication; Communication system security; Digital signatures; Elliptic curve cryptography; Globalization; Information management; Information security; Internet; Public key; Public key cryptography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
TENCON 2004. 2004 IEEE Region 10 Conference
Print_ISBN :
0-7803-8560-8
Type :
conf
DOI :
10.1109/TENCON.2004.1414519
Filename :
1414519
Link To Document :
بازگشت