Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
This paper presents multi-user protocol-extensions for Schnoff/Nyberg-Ruepple (NR) signatures and Zheng signcryption, both of which are elliptic curve (EC)/discrete logarithmic (DL) formulations. Our extension methodology is based on k-of-n threshold cryptography-with Shamir polynomial parameterisat...
| Main Authors: | , |
|---|---|
| Format: | Article |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2615/ |
| _version_ | 1848790103827152896 |
|---|---|
| author | Goh,, A Ngo, , DCL |
| author_facet | Goh,, A Ngo, , DCL |
| author_sort | Goh,, A |
| building | MMU Institutional Repository |
| collection | Online Access |
| description | This paper presents multi-user protocol-extensions for Schnoff/Nyberg-Ruepple (NR) signatures and Zheng signcryption, both of which are elliptic curve (EC)/discrete logarithmic (DL) formulations. Our extension methodology is based on k-of-n threshold cryptography-with Shamir polynomial parameterisation and Feldman-Pedersen verification-resulting in multi-sender Schnorr-NR (SNR) and multi-sender/receiver Zheng-NR (ZNR) protocols, all of which are interoperable with their single-user base formulations. The ZNR protocol-extensions are compared with the earlier Takaragi et al multi-user sign-encryption, which is extended from a base-protocol with two random key-pairs following the usual specification of one each of signing and encryption. Both single and double-pair formulations are analysed from the viewpoint of EC equivalence (EQ) establishment, which is required for rigorous multi-sender functionality. We outline a rectification to the original Takaragi et al formulation; thereby enabling parameter-share verification, but at significantly increased overheads. This enables comprehensive equivalent-functionality comparisons with the various multi-user ZNR protocol-extensions. The single-pair ZNR approach is shown to be significantly more efficient, in some cases demonstrating a two/three-fold advantage. |
| first_indexed | 2025-11-14T18:07:18Z |
| format | Article |
| id | mmu-2615 |
| institution | Multimedia University |
| institution_category | Local University |
| last_indexed | 2025-11-14T18:07:18Z |
| publishDate | 2003 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | mmu-26152011-08-24T01:35:28Z http://shdl.mmu.edu.my/2615/ Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection Goh,, A Ngo, , DCL QA75.5-76.95 Electronic computers. Computer science This paper presents multi-user protocol-extensions for Schnoff/Nyberg-Ruepple (NR) signatures and Zheng signcryption, both of which are elliptic curve (EC)/discrete logarithmic (DL) formulations. Our extension methodology is based on k-of-n threshold cryptography-with Shamir polynomial parameterisation and Feldman-Pedersen verification-resulting in multi-sender Schnorr-NR (SNR) and multi-sender/receiver Zheng-NR (ZNR) protocols, all of which are interoperable with their single-user base formulations. The ZNR protocol-extensions are compared with the earlier Takaragi et al multi-user sign-encryption, which is extended from a base-protocol with two random key-pairs following the usual specification of one each of signing and encryption. Both single and double-pair formulations are analysed from the viewpoint of EC equivalence (EQ) establishment, which is required for rigorous multi-sender functionality. We outline a rectification to the original Takaragi et al formulation; thereby enabling parameter-share verification, but at significantly increased overheads. This enables comprehensive equivalent-functionality comparisons with the various multi-user ZNR protocol-extensions. The single-pair ZNR approach is shown to be significantly more efficient, in some cases demonstrating a two/three-fold advantage. 2003 Article NonPeerReviewed Goh,, A and Ngo, , DCL (2003) Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection. OMMUNICATIONS AND MULTIMEDIA SECURITY, 2828 . pp. 27-39. ISSN 0302-9743 |
| spellingShingle | QA75.5-76.95 Electronic computers. Computer science Goh,, A Ngo, , DCL Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection |
| title | Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection |
| title_full | Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection |
| title_fullStr | Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection |
| title_full_unstemmed | Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection |
| title_short | Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection |
| title_sort | multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection |
| topic | QA75.5-76.95 Electronic computers. Computer science |
| url | http://shdl.mmu.edu.my/2615/ |