Title :
Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices
Author :
Tang, Caimu ; Chronopoulos, Anthony T. ; Raghavendra, Cauligi S.
Author_Institution :
Univ. of Southern California
Abstract :
Group based transactions are becoming common via handhelds. Single key based systems may not be able to meet various security requirements. In this paper, we propose a threshold signature scheme based on Pedersen distributed key generation principle which is suitable for handheld devices and ad-hoc networks. Existing distributed key generation protocols use either cryptosystems based on the hardness of discrete logarithm over a finite field or integer factorization. Elliptic curve cryptosystems provide a promising alternative with efficiency which is suitable for low-power devices in terms of memory and processing overhead. In the proposed scheme, the public key from the key generation protocol follows a uniform distribution in the elliptic curve additive group, and the signature can be generated and verified efficiently. We evaluated the proposed key generation protocol and signature scheme using PARI/GP, and the key generation time takes a fraction of a second and the signature signing and verifying can be finished in a few milliseconds on the LINUX Intel PXA 255 processor.
Keywords :
(DKG); (ECC); (ECDLP); Discrete Logarithm Problem over a Finite Field; Distributed Key Generation; Elliptic Curve Cryptosystems; Elliptic Curve Discrete Logarithm Problem; Threshold Cryptography; Ad hoc networks; Digital signatures; Elliptic curve cryptography; Elliptic curves; Galois fields; Handheld computers; Linux; Protocols; Public key; Public key cryptography; (DKG); (ECC); (ECDLP); Discrete Logarithm Problem over a Finite Field; Distributed Key Generation; Elliptic Curve Cryptosystems; Elliptic Curve Discrete Logarithm Problem; Threshold Cryptography;
Conference_Titel :
Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference on
Print_ISBN :
0-7695-2369-2
DOI :
10.1109/SECURECOMM.2005.52