Threshold authenticated encryption scheme using labor-division signature

This study presents a new (t, n) threshold-authenticated encryption scheme with message linkage to reduce the load on the signer using a division-of-labor signature. Only t signers can examine and sign an over-large message on behalf of the whole group, by dividing the whole message into a few readable sub-message blocks; then, each signer needs only examine and sign the designated sub-message block rather than the whole message. Consequently, the load on the signer should be substantially reduced to improve the performance. The proposed scheme is based on the elliptic curve cryptosystem, which can reach highly efficient performance and comprehensiveness of security, supporting the practical use of the scheme.

[1]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[2]  Chin-Chen Chang,et al.  (t, n) Threshold Digital Signature With Traceability Property , 1999, J. Inf. Sci. Eng..

[3]  K. Kurosawa,et al.  New EIGamal Type Threshold Digital Signature Scheme , 1996 .

[4]  L. Harn Group-oriented (t, n) threshold digital signature scheme and digital multisignature , 1994 .

[5]  Chi-Sung Laih,et al.  Cryptanalysis of Nyberg-Rueppel's message recovery scheme , 2000, IEEE Communications Letters.

[6]  Chin-Chen Chang,et al.  Authenticated Encryption Schemes with Linkage Between Message Blocks , 1997, Inf. Process. Lett..

[7]  Aggelos Kiayias,et al.  Traceable Signatures , 2004, EUROCRYPT.

[8]  Susan K. Langford Threshold DSS Signatures without a Trusted Party , 1995, CRYPTO.

[9]  Chin-Chen Chang,et al.  Threshold signature schemes with traceable signers in group communications , 1998, Comput. Commun..

[10]  Neal Koblitz,et al.  Algebraic aspects of cryptography , 1998, Algorithms and computation in mathematics.

[11]  R. A. Rueppel,et al.  Message recovery for signature schemes based on the discrete logarithm problem , 1994, EUROCRYPT.

[12]  Chin-Chen Chang,et al.  Autenticated Encryption Schemes with Message Linkage , 1996, Inf. Process. Lett..

[13]  Chin-Chen Chang,et al.  Authenticated encryption scheme without using a one way function , 1995 .

[14]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[15]  Alfred Menezes,et al.  The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..

[16]  Patrick Horster,et al.  Authenticated encryption schemes with low communication costs , 1994 .

[17]  Jinn-ke Jan,et al.  An Efficient Authenticated Encryption Scheme With Message Linkages and Low Communication Costs , 2002, J. Inf. Sci. Eng..

[18]  Rainer A. Rueppel,et al.  A new signature scheme based on the DSA giving message recovery , 1993, CCS '93.

[19]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1999, TNET.