DocumentCode
430962
Title
An efficient threshold group signature scheme
Author
Chen, Tzer-Shyong ; Hsiao, Tsung-Chih ; Chen, Tzer-Long
Author_Institution
Dept. of Inf. Manage., Tung-Hai Univ., Taiwan
Volume
B
fYear
2004
fDate
21-24 Nov. 2004
Firstpage
13
Abstract
Globalization of the Internet has boosted electronic information exchange on both the personal and business levels. The popularity turned information communication and secure Internet transactions, which require the verification of digital signatures and identities, into a hot issue. Most existing digital signature schemes are based on the public key system of RSA and ElGamal. Security thus depends on solving factorization and the discrete logarithm. However, the encryption-decryption key of the RSA is too large and the signature authentication of ElGamal takes too long, making this method unsuitable for certain systems. Additionally, the superior security and efficiency of the elliptic curve cryptosystem (ECC) provides an imperative application foreground. This study integrates the short secret key characteristic of the elliptic curve cryptosystem and the (t,n) threshold method to create a signature scheme with simultaneous signing. The distinguishing feature of the proposed scheme is that the threshold value denotes the minimum number of members required to produce a valid group signature. All message recipients then can verify the signature.
Keywords
Internet; business communication; digital signatures; globalisation; handwriting recognition; public key cryptography; telecommunication security; ECC; ElGamal; Internet transaction security; RSA; business level; digital signature verification; discrete logarithm; electronic information exchange; elliptic curve cryptosystem; encryption-decryption key; factorization; globalization; group signature scheme; public key system; signature authentication; Authentication; Communication system security; Digital signatures; Elliptic curve cryptography; Globalization; Information management; Information security; Internet; Public key; Public key cryptography;
fLanguage
English
Publisher
ieee
Conference_Titel
TENCON 2004. 2004 IEEE Region 10 Conference
Print_ISBN
0-7803-8560-8
Type
conf
DOI
10.1109/TENCON.2004.1414519
Filename
1414519
Link To Document