A key sharing scheme over GF(2 5) to use in ECC

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Since the introduction of public-key cryptography by Diffe and Hellman in 1976, the potential for the use of the discrete logarithm problem in public-key cryptosystems has been recognized. Although the discrete logarithm problem as first employed by Diffe and Hellman was defined explicitly as the problem of finding logarithms with respect to a generator in the multiplicative group of the integers module a prime, this idea can be extended to arbitrary groups and in particular, to elliptic curve groups. The resulting public-key systems provide relatively small block size, high speed, and high security. In this paper, a vector space secrets sharing scheme is proposed in detail. Its security is based on the security of ECC. This scheme has the following characteristic: the precondition of (t,n)- threshold secret sharing scheme that all assignees purview must be same is generalized. A verifiable infrastructure is provided, which can be used to detect the cheaters from the dealers and assignees. The shared key distributed by dealer is encrypted based on ECC, which enhances the security. So this scheme is of less computation cost which is valuable in applications with limited memory, communications bandwidth or computing power. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Rishivarman, A. R., Parthasarathy, B., & Thiagarajan, M. (2012). A key sharing scheme over GF(2 5) to use in ECC. In Communications in Computer and Information Science (Vol. 283 CCIS, pp. 514–521). https://doi.org/10.1007/978-3-642-28926-2_58

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free