ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem (Q556108): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Group-oriented (t, n) threshold digital signature scheme and digital multisignature / rank
 
Normal rank
Property / cites work
 
Property / cites work: A non-interactive public-key distribution system / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elliptic Curve Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3718617 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Monte Carlo Methods for Index Computation (mod p) / rank
 
Normal rank
Property / cites work
 
Property / cites work: An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reducing elliptic curve logarithms to logarithms in a finite field / rank
 
Normal rank
Property / cites work
 
Property / cites work: Evaluation of discrete logarithms in a group of 𝑝-torsion points of an elliptic curve in characteristic 𝑝 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The discrete logarithm problem on elliptic curves of trace one / rank
 
Normal rank

Revision as of 11:25, 10 June 2024

scientific article
Language Label Description Also known as
English
ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem
scientific article

    Statements

    ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem (English)
    0 references
    0 references
    0 references
    0 references
    13 June 2005
    0 references
    The authors introduce three so-called {identification group-oriented theshold} digital signature schemes based on the elliptic curve discrete log problem. Their goal is to optimize these techniques for implementation within a network. They cite five distinct advantages to their approach, most notably involving efficiency of security for user identification and verification, as well as smaller bandwidth and certificate sizes than those for known public-key schemes. They conclude the paper with performance analyses.
    0 references
    ID-based
    0 references
    threshold digital signature
    0 references
    ellipic curve cryptography
    0 references

    Identifiers