Digital multi-signature scheme based on the elliptic curve cryptosystem

被引:16
作者
Chen, TS [1 ]
Huang, KH
Chung, YF
机构
[1] Tunghai Univ, Dept Informat Management, Taichung, Taiwan
[2] Taiwan Natl Univ, Dept Elect Engn, Taipei, Taiwan
关键词
identification; elliptic curve cryptosystem (ECC); digital multi-signature scheme; elliptic curve discrete logarithm problem;
D O I
10.1007/BF02944760
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the study, the digital multi-signature scheme, constructed by the integration of one-way hash function and identification scheme, are proposed based on the elliptic curve cryptosystem (ECC). To the efficiency in performance, the ECC has been generally regarded as positive, and the security caused by the Elliptic Curve Discrete Logarithm Problem (ECDLP) is highly also taken highly important. The main characteristic of the proposed scheme is that the length of the multi-signature is fixed rather than changeable and it will not increase with the number of group members.
引用
收藏
页码:570 / IBC
页数:4
相关论文
共 13 条
[1]  
Beth T, 1988, LNCS, V330, P77
[2]  
BRICKELL JS, 1999, LECT NOTES COMPUTER, V1716, P122
[3]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[4]  
FEIGE U, 1987, P 19 ACM S THEOR COM, P210
[5]   HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS [J].
FIAT, A ;
SHAMIR, A .
LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 :186-194
[6]   THE KNOWLEDGE COMPLEXITY OF INTERACTIVE PROOF SYSTEMS [J].
GOLDWASSER, S ;
MICALI, S ;
RACKOFF, C .
SIAM JOURNAL ON COMPUTING, 1989, 18 (01) :186-208
[7]   GROUP-ORIENTED (T,N) THRESHOLD DIGITAL SIGNATURE SCHEME AND DIGITAL MULTISIGNATURE [J].
HARN, L .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (05) :307-313
[8]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[9]   The state of elliptic curve cryptography [J].
Koblitz, N ;
Menezes, A ;
Vanstone, S .
DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) :173-193
[10]   USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY [J].
MILLER, VS .
LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 :417-426