Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
This paper presents multi-user protocol-extensions for Schnoff/Nyberg-Ruepple (NR) signatures and Zheng signcryption, both of which are elliptic curve (EC)/discrete logarithmic (DL) formulations. Our extension methodology is based on k-of-n threshold cryptography-with Shamir polynomial parameterisat...
| Main Authors: | , |
|---|---|
| Format: | Article |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2615/ |