By Topic

An Elliptic Curve Digital Signature Scheme Based on Proactive Secret Sharing

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Ping Guo ; Coll. of Comput. Sci., Nan Jing Univ. of Sci. & Technol., Nan Jing, China ; Hong Zhang

Most digital signature algorithms are based on RSA algorithm, and traditional secret sharing schemes involve the use of a mutually trusted authority to assist in the generation and distribution of shares that will allow a secret to be protected among a set of participants. In contrast, this paper describes a signature scheme based on elliptic curves and proactive secret sharing. A general protocol is discussed and several related steps of this protocol are presented. Special attention is given to mutually trusted authority-free threshold scheme. The scheme ensures that a system can provide reliable signature services even if some servers fail caused by attacks or failures.

Published in:

Intelligent Systems, 2009. GCIS '09. WRI Global Congress on  (Volume:2 )

Date of Conference:

19-21 May 2009