ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem (Q556108): Difference between revisions
From MaRDI portal
Created a new Item |
Normalize DOI. |
||
(6 intermediate revisions by 6 users not shown) | |||
Property / DOI | |||
Property / DOI: 10.1016/j.amc.2004.06.033 / rank | |||
Property / review text | |||
The authors introduce three so-called {identification group-oriented theshold} digital signature schemes based on the elliptic curve discrete log problem. Their goal is to optimize these techniques for implementation within a network. They cite five distinct advantages to their approach, most notably involving efficiency of security for user identification and verification, as well as smaller bandwidth and certificate sizes than those for known public-key schemes. They conclude the paper with performance analyses. | |||
Property / review text: The authors introduce three so-called {identification group-oriented theshold} digital signature schemes based on the elliptic curve discrete log problem. Their goal is to optimize these techniques for implementation within a network. They cite five distinct advantages to their approach, most notably involving efficiency of security for user identification and verification, as well as smaller bandwidth and certificate sizes than those for known public-key schemes. They conclude the paper with performance analyses. / rank | |||
Normal rank | |||
Property / reviewed by | |||
Property / reviewed by: Richard A. Mollin / rank | |||
Normal rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 94A62 / rank | |||
Normal rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 94A60 / rank | |||
Normal rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 14G50 / rank | |||
Normal rank | |||
Property / zbMATH DE Number | |||
Property / zbMATH DE Number: 2175195 / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
ID-based | |||
Property / zbMATH Keywords: ID-based / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
threshold digital signature | |||
Property / zbMATH Keywords: threshold digital signature / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
ellipic curve cryptography | |||
Property / zbMATH Keywords: ellipic curve cryptography / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1016/j.amc.2004.06.033 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W2091490260 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Group-oriented (t, n) threshold digital signature scheme and digital multisignature / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A non-interactive public-key distribution system / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Elliptic Curve Cryptosystems / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3718617 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Monte Carlo Methods for Index Computation (mod p) / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.) / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Reducing elliptic curve logarithms to logarithms in a finite field / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Evaluation of discrete logarithms in a group of 𝑝-torsion points of an elliptic curve in characteristic 𝑝 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: The discrete logarithm problem on elliptic curves of trace one / rank | |||
Normal rank | |||
Property / DOI | |||
Property / DOI: 10.1016/J.AMC.2004.06.033 / rank | |||
Normal rank | |||
links / mardi / name | links / mardi / name | ||
Latest revision as of 21:27, 9 December 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem |
scientific article |
Statements
ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem (English)
0 references
13 June 2005
0 references
The authors introduce three so-called {identification group-oriented theshold} digital signature schemes based on the elliptic curve discrete log problem. Their goal is to optimize these techniques for implementation within a network. They cite five distinct advantages to their approach, most notably involving efficiency of security for user identification and verification, as well as smaller bandwidth and certificate sizes than those for known public-key schemes. They conclude the paper with performance analyses.
0 references
ID-based
0 references
threshold digital signature
0 references
ellipic curve cryptography
0 references
0 references