• DocumentCode
    2261191
  • Title

    Verifiable threshold cryptosystems based on elliptic curve

  • Author

    Yiliang, Han ; Xiaoyuan, Yang ; Jun, Sun ; Delong, LI

  • Author_Institution
    Dept. of Electron. Technol., Eng. Coll. of Armed Police Force, Xi´´an, China
  • fYear
    2003
  • fDate
    20-23 Oct. 2003
  • Firstpage
    334
  • Lastpage
    337
  • Abstract
    Verifiable (t, n) threshold ECSA (elliptic curve signature verification) signature algorithm and verifiable (t, n) threshold ECES (elliptic curve encrypt scheme) encryption algorithm are presented according to a secret sharing scheme for elliptic curve using Lagrange polynomial interpolation as access structure. A group of n players share an ECC (elliptic curve cryptosystem) secret key. Every qualified subset of the group, including t out of n players, could recover the secret key, so that they can sign and decrypt as well as the whole group, while no subset of t-1 players can accomplish it. The algorithms are perfect and secure verifiable secret shared schemes and their complexity is less than the same schemes based on DLP.
  • Keywords
    communication complexity; cryptography; interpolation; message authentication; polynomials; ECC; ECES; ECSA; Lagrange polynomial interpolation; elliptic curve cryptosystem; elliptic curve encrypt scheme; elliptic curve signature verification; encryption algorithm; secret key; secret sharing; signature algorithm; verifiable threshold cryptosystems; Computer networks; Elliptic curve cryptography; Elliptic curves; Galois fields; Interpolation; Lagrangian functions; Polynomials; Protection; Public key; Sun;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Networks and Mobile Computing, 2003. ICCNMC 2003. 2003 International Conference on
  • Print_ISBN
    0-7695-2033-2
  • Type

    conf

  • DOI
    10.1109/ICCNMC.2003.1243064
  • Filename
    1243064