Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection

This paper presents multi-user protocol-extensions for Schnoff/Nyberg-Ruepple (NR) signatures and Zheng signcryption, both of which are elliptic curve (EC)/discrete logarithmic (DL) formulations. Our extension methodology is based on k-of-n threshold cryptography-with Shamir polynomial parameterisat...

Full description

Bibliographic Details
Main Authors: Goh,, A, Ngo, , DCL
Format: Article
Published: 2003
Subjects:
Online Access:http://shdl.mmu.edu.my/2615/
_version_ 1848790103827152896
author Goh,, A
Ngo, , DCL
author_facet Goh,, A
Ngo, , DCL
author_sort Goh,, A
building MMU Institutional Repository
collection Online Access
description This paper presents multi-user protocol-extensions for Schnoff/Nyberg-Ruepple (NR) signatures and Zheng signcryption, both of which are elliptic curve (EC)/discrete logarithmic (DL) formulations. Our extension methodology is based on k-of-n threshold cryptography-with Shamir polynomial parameterisation and Feldman-Pedersen verification-resulting in multi-sender Schnorr-NR (SNR) and multi-sender/receiver Zheng-NR (ZNR) protocols, all of which are interoperable with their single-user base formulations. The ZNR protocol-extensions are compared with the earlier Takaragi et al multi-user sign-encryption, which is extended from a base-protocol with two random key-pairs following the usual specification of one each of signing and encryption. Both single and double-pair formulations are analysed from the viewpoint of EC equivalence (EQ) establishment, which is required for rigorous multi-sender functionality. We outline a rectification to the original Takaragi et al formulation; thereby enabling parameter-share verification, but at significantly increased overheads. This enables comprehensive equivalent-functionality comparisons with the various multi-user ZNR protocol-extensions. The single-pair ZNR approach is shown to be significantly more efficient, in some cases demonstrating a two/three-fold advantage.
first_indexed 2025-11-14T18:07:18Z
format Article
id mmu-2615
institution Multimedia University
institution_category Local University
last_indexed 2025-11-14T18:07:18Z
publishDate 2003
recordtype eprints
repository_type Digital Repository
spelling mmu-26152011-08-24T01:35:28Z http://shdl.mmu.edu.my/2615/ Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection Goh,, A Ngo, , DCL QA75.5-76.95 Electronic computers. Computer science This paper presents multi-user protocol-extensions for Schnoff/Nyberg-Ruepple (NR) signatures and Zheng signcryption, both of which are elliptic curve (EC)/discrete logarithmic (DL) formulations. Our extension methodology is based on k-of-n threshold cryptography-with Shamir polynomial parameterisation and Feldman-Pedersen verification-resulting in multi-sender Schnorr-NR (SNR) and multi-sender/receiver Zheng-NR (ZNR) protocols, all of which are interoperable with their single-user base formulations. The ZNR protocol-extensions are compared with the earlier Takaragi et al multi-user sign-encryption, which is extended from a base-protocol with two random key-pairs following the usual specification of one each of signing and encryption. Both single and double-pair formulations are analysed from the viewpoint of EC equivalence (EQ) establishment, which is required for rigorous multi-sender functionality. We outline a rectification to the original Takaragi et al formulation; thereby enabling parameter-share verification, but at significantly increased overheads. This enables comprehensive equivalent-functionality comparisons with the various multi-user ZNR protocol-extensions. The single-pair ZNR approach is shown to be significantly more efficient, in some cases demonstrating a two/three-fold advantage. 2003 Article NonPeerReviewed Goh,, A and Ngo, , DCL (2003) Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection. OMMUNICATIONS AND MULTIMEDIA SECURITY, 2828 . pp. 27-39. ISSN 0302-9743
spellingShingle QA75.5-76.95 Electronic computers. Computer science
Goh,, A
Ngo, , DCL
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
title Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
title_full Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
title_fullStr Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
title_full_unstemmed Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
title_short Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
title_sort multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
topic QA75.5-76.95 Electronic computers. Computer science
url http://shdl.mmu.edu.my/2615/