Title :
ECC-Based Threshold Digital Signature Scheme without a Trusted Party
Author :
Pei, Qingqi ; Ma, Jianfeng
Author_Institution :
Key Lab. of Comput. Networks & Inf. Security (Minist. of Educ.), Xidian Univ., Xi´´an, China
Abstract :
Based on the elliptic curve logarithm problem, a (t, n) threshold digital signature scheme was proposed in this paper. In the key generation phase, each participant¿s public and private keys, and the group public key are negotiated among all the participants with no trusted party required. In the signature generation phase, no secure communication is needed between any two participants. This scheme provides the capability of detecting cheating and identifying the cheat that may be from the internal participants or the external attackers. At the same time, this scheme has the advantages of elliptic curve cryptography. The security of this scheme is based on the difficulty of solving the elliptic curve discrete logarithm problem. Analyses show that this scheme is a computationally secure and efficient scheme.
Keywords :
cryptography; digital signatures; elliptic curve cryptography; elliptic curve logarithm problem; key generation phase; threshold digital signature scheme; Broadcasting; Communication system security; Digital signatures; Elliptic curve cryptography; Elliptic curves; Galois fields; Information security; Polynomials; Protocols; Public key; Elliptic Curve Cryptography; Security; Threshold Digital Signature; Trusted Party;
Conference_Titel :
Computational Intelligence and Security, 2008. CIS '08. International Conference on
Conference_Location :
Suzhou
Print_ISBN :
978-0-7695-3508-1
DOI :
10.1109/CIS.2008.139