Title :
Threshold Signcryption Based on Elliptic Curve
Author :
Han, Yiliang ; Yang, Xiaoyuan ; Hu, Junru
Author_Institution :
Dept. of Electron. Technol., Eng. Coll. of Armed Police Force, Xi´´an, China
Abstract :
The signcryption scheme presented by Zheng uses hash function and symmetrical cipher to encrypt message. The first protocol for threshold generation of Zhengpsilas signcryption scheme couldnpsilat support multiple public verifiers. In this paper, we proposed a new signcryption scheme based on EC-ELGamal type encryption. Message to be transmitted is embedded in Elliptic Curve as a point P(m) and encrypted by point addition which is efficient and secure as well as exiting schemes. By using verifiable secret sharing and secure multi-party computation, we propose a protocol for threshold generation of the signcryption. Because point addition couldnpsilat map coordinate addition directly, we introduce a linear sum of coordinates to reconstruct the private coordinate. The protocol supports k out of n senders and the public verifier. The specific receiver can verify the validity of the signature before decrypting the cipher. The proposed protocol is a perfect threshold scheme. Thus, it can defend the attack launched by k-1 players. Complexity of them is less than the same schemes based on DLP (Discrete Logarithm Problem).
Keywords :
cryptographic protocols; public key cryptography; discrete logarithm problem; elliptic curve; hash function; public verifier; symmetrical cipher; threshold signcryption; Computer science; Educational institutions; Elliptic curve cryptography; Elliptic curves; Gallium nitride; Information security; Information technology; Protection; Protocols; Variable structure systems; Elliptic Curve; Secret Sharing Scheme; Threshold Signcryption;
Conference_Titel :
Information Technology and Computer Science, 2009. ITCS 2009. International Conference on
Conference_Location :
Kiev
Print_ISBN :
978-0-7695-3688-0
DOI :
10.1109/ITCS.2009.273