×

ECC Based Threshold Decryption

消耗积分:2 | 格式:rar | 大小:333 | 2008-11-18

张国厚

分享资料个

Abstract The threshold cryptography provides a new approach to building intrusion tolerance
applications. In this paper, a threshold decryption scheme based elliptic curve cryptography is presented.
A zero-knowledge test approach based on elliptic curve cryptography is designed. The application of
these techniques in Web security is studied. Performance analysis shows that our scheme is characterized
by excellent security as well as high efficiency.
Key words intrusion tolerance; elliptic curve cryptography; threshold decryption; web
security

Despite all the defenses, some of the attacks will
inevitably be successful. We must build intrusion
tolerant systems that can operate through these attacks.
The threshold cryptography provides new
methodology for developing intrusion tolerance system.
The research on the threshold cryptography based
intrusion tolerance techniques concentrate on threshold
encryption, threshold decryption, threshold
authentication and threshold signature. Generally,
threshold encryption and threshold decryption are
based on the cryptography algorithms, which are
homomorphic, such as RSA. The homomorpohic
property is necessary in order to generate shares of the
key so that partial cryptograms can be combined into a
cryptogram for the correct message[1]. Therefore,
nearly all projects studying on threshold cryptography
techniques focused on the homomorphic algorithm.
Among these, the intrusion tolerance via threshold
cryptography (ITTC) project developed by Stanford
University is notable, which researched and
developed the intrusion tolerance application based
on threshold RSA[2].
Currently, elliptic curve cryptography (ECC) is
regarded as an attractive cryptography that can
provide greater strength, higher speed and smaller
keys than other cryptography systems[3,4]. Therefore,
the research on threshold ECC deserves great
attention. However, ECC is not homomorphic. It is
difficult to design ECC-based threshold schemes. So,
there are not many public published papers or
reports on ECC-based threshold schemes, especially
on ECC-based threshold encryption or decryption
schemes. In this paper, we present an ECC based
threshold decryption scheme and a zero-knowledge
test approach. And we apply our research results in
building intrusion tolerant Web security system.

声明:本文内容及配图由入驻作者撰写或者入驻合作网站授权转载。文章观点仅代表作者本人,不代表电子发烧友网立场。文章及其配图仅供工程师学习之用,如有内容侵权或者其他违规问题,请联系本站处理。 举报投诉

评论(0)
发评论

下载排行榜

全部0条评论

快来发表一下你的评论吧 !