Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Digital multi-signature scheme based on the elliptic curve cryptosystem
Chen T., Huang K., Chung Y. Journal of Computer Science and Technology19 (4):570-573,2004.Type:Article
Date Reviewed: Feb 1 2005

Chen, Huang, and Chung develop a multi-signature algorithm, based on an older paper by Popescu [1].

Using a one-way hashing function and Popescu’s identification scheme, the proposed algorithm meets the security and efficiency requirements of a cryptosystem. The hash function is designed with two characteristics: the output is of fixed length (the input depends of the number of group members), and applying this hash function can reduce the length of the signed message.

Section 2 presents the proposed scheme, with four phases: system initialization, key generation, multi-signature generation, and multi-signature verification.

Section 3 analyzes the algorithm’s efficiency and security (three types of attacks are considered). The authors further state that the scheme resists the chosen-message attack defined by ElGamal and Harn.

Section 4 presents the authors’ conclusions. A comparison of performances between this group signature scheme and the scheme proposed by Nyang (for application to smart cards) shows the advantage of the Chen-Huang-Chung scheme.

Reviewer:  Adrian Atanasiu Review #: CR130745 (0508-0932)
1) Popescu, C. An identification scheme based on the elliptic curve discrete logarithm problem. In Proc. of the 4th International Conference/Exhibition on High Performance Computing in the Asia-Pacific Region IEEE, 2000, 624–625.
Bookmark and Share
  Reviewer Selected
 
 
Security, Integrity, And Protection (H.2.0 ... )
 
 
Authentication (K.6.5 ... )
 
 
Cryptographic Controls (D.4.6 ... )
 
 
Security (K.4.4 ... )
 
 
Algorithms (I.1.2 )
 
 
Electronic Commerce (K.4.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Security, Integrity, And Protection": Date
Views for multilevel database security
Denning D., Akl S., Heckman M., Lunt T., Morgenstern M., Neumann P., Schell R. IEEE Transactions on Software Engineering SE-13(2): 129-140, 1987. Type: Article
Feb 1 1988
Computer security: a comprehensive controls checklist
Wood C., Banks W., Guarro S., Garcia A., Hampel V., Sartorio H., Wiley-Interscience, New York, NY, 1987. Type: Book (9789780471847953)
Feb 1 1988
Incorporating access control in forms systems
Yeo G. Computers and Security 4(2): 109-122, 1985. Type: Article
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy