A General Threshold Signature and Authenticated Encryption Scheme Based on ElGamal System
نویسندگان
چکیده
Based on ElGamal system, a group-oriented threshold signature and authenticated encryption scheme was put forward. After being signed by a signer group employing ) , ( n t threshold signature scheme, the message m was transmitted to a particular verifier group, and then the signature was verified through the cooperation of k ones from the verifier group with l members. Similarly, a general authenticated encryption scheme characterized by ) , ( l k joint verification was put forward through integrating ) , ( n t threshold signature scheme and message recovery technique together; After being encrypted singed by any t ones from a group with n members, the message m was transmitted to a particular verifier group with l members, and then recovered through the cooperation of any k ones from the verifier group. The security of this scheme is based on Shamir threshold scheme and ElGamal system. It realized the directional transmission of message between different groups and enjoyed the characteristics of reduced communication load and lowered calculation complexity, etc.
منابع مشابه
Improvement on a Threshold Authenticated Encryption Scheme
The authenticated encryption scheme allows one signer to generate an authenticated cipher-text so that no one except the designated verifier can recover the message and verify the message. In a (t, n) threshold authenticated encryption scheme, any t or more signers can generate an authenticated encryption for a message and send it to the designated verifier. Compared with the conventional encry...
متن کاملA Secure Scheme for Authenticated Encryption
The paper proposes a new scheme of authenticated encryption that is either publicly verifiable or not publicly verifiable depending on the quantity of information the recipient released. This property would give recipient much flexibility in many applications. This scheme combines the ElGamal encryption with Schnorr signature. Considering the security goal of signature, the resultant scheme is ...
متن کاملA Threshold Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem
A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an authenticated cipher-text for a message and only the designated verifier can verify the message. Recently, Chung et al. [1] proposed a (t, n) threshold authenticated encryption scheme by applying a division-of-labor signature technique. However, we showed that the scheme has a design flaw. Then, we propo...
متن کاملArtemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملThe new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013