DocumentCode
2261191
Title
Verifiable threshold cryptosystems based on elliptic curve
Author
Yiliang, Han ; Xiaoyuan, Yang ; Jun, Sun ; Delong, LI
Author_Institution
Dept. of Electron. Technol., Eng. Coll. of Armed Police Force, Xi´´an, China
fYear
2003
fDate
20-23 Oct. 2003
Firstpage
334
Lastpage
337
Abstract
Verifiable (t, n) threshold ECSA (elliptic curve signature verification) signature algorithm and verifiable (t, n) threshold ECES (elliptic curve encrypt scheme) encryption algorithm are presented according to a secret sharing scheme for elliptic curve using Lagrange polynomial interpolation as access structure. A group of n players share an ECC (elliptic curve cryptosystem) secret key. Every qualified subset of the group, including t out of n players, could recover the secret key, so that they can sign and decrypt as well as the whole group, while no subset of t-1 players can accomplish it. The algorithms are perfect and secure verifiable secret shared schemes and their complexity is less than the same schemes based on DLP.
Keywords
communication complexity; cryptography; interpolation; message authentication; polynomials; ECC; ECES; ECSA; Lagrange polynomial interpolation; elliptic curve cryptosystem; elliptic curve encrypt scheme; elliptic curve signature verification; encryption algorithm; secret key; secret sharing; signature algorithm; verifiable threshold cryptosystems; Computer networks; Elliptic curve cryptography; Elliptic curves; Galois fields; Interpolation; Lagrangian functions; Polynomials; Protection; Public key; Sun;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Networks and Mobile Computing, 2003. ICCNMC 2003. 2003 International Conference on
Print_ISBN
0-7695-2033-2
Type
conf
DOI
10.1109/ICCNMC.2003.1243064
Filename
1243064
Link To Document