Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection

This paper presents multi-user protocol-extensions for Schnoff/Nyberg-Ruepple (NR) signatures and Zheng signcryption, both of which are elliptic curve (EC)/discrete logarithmic (DL) formulations. Our extension methodology is based on k-of-n threshold cryptography-with Shamir polynomial parameterisat...

Full description

Bibliographic Details
Main Authors: Goh,, A, Ngo, , DCL
Format: Article
Published: 2003
Subjects:
Online Access:http://shdl.mmu.edu.my/2615/