Peng Jian-fen, Zhou Yajian, Wang Cong, Yang Yixian
{"title":"改进的最优型椭圆曲线盲签名方案在阈值签名中的应用","authors":"Peng Jian-fen, Zhou Yajian, Wang Cong, Yang Yixian","doi":"10.1109/ICNDS.2010.5479344","DOIUrl":null,"url":null,"abstract":"Expression of blind message in the optimal-type blind signature scheme was modified so that it can combine with threshold signature, which leads to an effective threshold blind signature scheme based on elliptic curve cryptography, it has the following securities: strong verifiability, nonrepudiation, unforgeability, blindness and robustness, and also takes advantage of characteristics of elliptic curve such as higher security and shorter key, as well as lower computational complexity compared with the previous schemes.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"An application of modified optimal-type elliptic curve blind signature scheme to threshold signature\",\"authors\":\"Peng Jian-fen, Zhou Yajian, Wang Cong, Yang Yixian\",\"doi\":\"10.1109/ICNDS.2010.5479344\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Expression of blind message in the optimal-type blind signature scheme was modified so that it can combine with threshold signature, which leads to an effective threshold blind signature scheme based on elliptic curve cryptography, it has the following securities: strong verifiability, nonrepudiation, unforgeability, blindness and robustness, and also takes advantage of characteristics of elliptic curve such as higher security and shorter key, as well as lower computational complexity compared with the previous schemes.\",\"PeriodicalId\":403283,\"journal\":{\"name\":\"2010 International Conference on Networking and Digital Society\",\"volume\":\"60 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-05-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Networking and Digital Society\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICNDS.2010.5479344\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Networking and Digital Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNDS.2010.5479344","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An application of modified optimal-type elliptic curve blind signature scheme to threshold signature
Expression of blind message in the optimal-type blind signature scheme was modified so that it can combine with threshold signature, which leads to an effective threshold blind signature scheme based on elliptic curve cryptography, it has the following securities: strong verifiability, nonrepudiation, unforgeability, blindness and robustness, and also takes advantage of characteristics of elliptic curve such as higher security and shorter key, as well as lower computational complexity compared with the previous schemes.