A General Threshold Signature Scheme Based on Elliptic Curve
- 10.2991/iccia.2012.21How to use a DOI?
- Elliptic Curve, Threshold signature, Company-oriented, Interpolation polynomial
Based on Elliptic Curve cryptosystem, a threshold signature scheme characterized by (k, l) joint verification for (t, n) signature is put forward. After being signed by a signer company employing (t, n) threshold signature scheme, the information m is transmitted to a particular verifier company, and then the signature is verified through the cooperation of k ones from the verifier company with l members, so as to realize a directional transmission between different companies. Finally, the application examples of the company encryption communication system, the generating polynomial of company private key and public key were given. The security of this scheme is based on Shamir threshold scheme and Elliptic Curve system, and due to the advantages of Elliptic Curve, the scheme enjoys wider application in practice.
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Yulian Shang AU - Xiujuan Wang AU - Yujuan Li AU - Yufei Zhang PY - 2014/05 DA - 2014/05 TI - A General Threshold Signature Scheme Based on Elliptic Curve BT - Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012) PB - Atlantis Press SP - 89 EP - 92 SN - 1951-6851 UR - https://doi.org/10.2991/iccia.2012.21 DO - 10.2991/iccia.2012.21 ID - Shang2014/05 ER -