English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4231017      Online Users : 350
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/21907


    Title: An efficient threshold group signature scheme??
    Authors: Chen, T.-S., Hsiao, T.-C., Chen, T.-L.
    Contributors: Department of Information Management, Tunghai University
    Keywords: Digital signature;Elliptic curve cryptosystem;Public key;Threshold signature
    Date: 2004-11-21
    Issue Date: 2013-05-15T09:07:32Z (UTC)
    Publisher: Chiang Mai; Thailand
    Abstract: Globalization of the Internet has boosted electronic information exchange on both the personal and business levels. The popularity turned information communication and secure Internet transactions, which require the verification of digital signatures and identities, into a hot issue. Most existing digital signature schemes are based on the public key system of RSA and ElGamal. Security thus depends on solving factorization and the discrete logarithm. However, the encryption-decryption key of the RSA is too large, and the signature authentication of ElGamal takes too long, making this method unsuitable for certain systems. Additionally, the superior security and efficiency of the elliptic curve cryptosystem (ECC) provides an imperative application foreground. This study integrates the short secret key characteristic of the elliptic curve cryptosystem and the (t, n) threshold method to create a signature scheme with simultaneous signing. The distinguishing feature of the proposed scheme is that the threshold value denotes the minimum number of members required to produce a valid group signature. All message recipients then can verify the signature. ? 2004 IEEE.
    Relation: IEEE Region 10 Annual International Conference, Proceedings/TENCON B , pp. B13-B16
    Appears in Collections:[資訊管理學系所] 會議論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML339View/Open


    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback