Advertisement

Wuhan University Journal of Natural Sciences

, Volume 10, Issue 1, pp 165–168 | Cite as

Verifiable (t, n) threshold signature scheme based on elliptic curve

  • Wang Hua-qun
  • Zhao Jun-xi
  • Zhang Li-jun
Security of Network and Communication
  • 88 Downloads

Abstract

Based on the difficulty of solving the ECDLP (elliptic curve discrete logarithm problem) on the finite field, we present a (t, n) threshold signature scheme and a verifible key agreement scheme without trusted party. Applying a modified clliptic curve signature equation, we get a more efficient signature scheme than the existing ECDSA (elliptic curve digital signature algorithm) from the computability and security view. Our scheme has a shorter key, faster computation, and better security.

Abstract

Based on the difficulty of solving the ECDLP (elliptic curve discre logarithm problem) on the finite field, we present a (t, n) threshold signature scheme and a verifiable key agreement scheme without trusted party. Applying a modified clliptic curve signature equation, we get a more efficient signature scheme than the existing ECDSA (elliptic curve digital signature algorithm) form the computability and security view. Our scheme has a shorter key, faster computation, and better security.

Key words

threshold signature secret sharing elliptic curve elliptic curve discrete logarithm 

CLC number

TP 309 

Key words

threshold signature secret sharing elliptic curve elliptic curve discrete logarithm 

CLC number

TP 309 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Shamir A. How to Share a Secret.Comm Asso Comput Mach, 1979,22(11):612–613.MATHMathSciNetGoogle Scholar
  2. [2]
    Desmedt Y. Society and Group Oriented Cryptography: a New Concept.Advances in Cryptology-CRYPTO '87. Berlin: Springer-Verlag, 1988. 462.Google Scholar
  3. [3]
    Chaum D, van Heyst E. Group Signature.Advances in Cryptology EUROCRYPT '91. Berlin: Springer-Verlag, 1991. 556.Google Scholar
  4. [4]
    Zhang Xian-hong.Digital Signature Principles and Techniques. Beijing: China Machine Press, 2004, 241 (Ch).Google Scholar
  5. [5]
    Desmedt Y, Frankel Y. Shared Generation of Authenticators and Signatures.Advances in Cryptology-CRYPTO'91. Berlin: Springer-Verlag, 1992. 484.Google Scholar
  6. [6]
    Wang C T, Lin C H, Chang C C. Threshold Signature Schemes with Traceable Signers in Group Communications.Computer Communications, 1998,21(8):771–776.CrossRefGoogle Scholar
  7. [7]
    Harn L. Group-Oriented (t, n) Threshold Digital Signature Scheme and Digital Multisignature.IEEE Proceeding of Computers and Digital and Technique, 1994,141(5):307–313.MATHCrossRefGoogle Scholar
  8. [8]
    Yang Jun-hui, Dai Zong-duo, Yang Dong-yi,et al. An Elliptic Curve Signature Scheme and an Identity-Based Signature Agreement.Journal of Software, 2000,11(10):1303–1306 (Ch).Google Scholar
  9. [9]
    Menezes A J.Elliptic Curve Public Key Cryptosystems. Boston: Kluwer Academic Publishers, 1993. 128.MATHGoogle Scholar
  10. [10]
    Lu Kai-cheng.Computer Cryptography.Third Edition. Beijing: Tsinghua University Press, 1998. 493 (Ch).Google Scholar
  11. [11]
    Feng Deng-guo.Cryptography Analysis. Beijing: Tsinghua University Press, 2000. 136 (Ch).Google Scholar

Copyright information

© Springer 2005

Authors and Affiliations

  1. 1.Information Engineering DepartmentNanjing University of Posts and TelecommunicationsNanjingChina
  2. 2.Applied Mathematics and Physics DepartmentNanjing University of Posts and TelecommunicationsNanjingChina

Personalised recommendations