下载中心
ECC Based Threshold Decryption Scheme and Its Application in Web Securitypdf
1星 发布者: baidu_linker

2013-09-20 | 1积分 | 111.33KB |  0 次下载

下载 收藏 评论

文档简介
标签: based

based

threshold

threshold

scheme

scheme

and

and

application

application

ECU

ECU

汽车电子

汽车电子

Abstract The threshold cryptography provides a new approach to building intrusion toleranceapplications. In this paper, a threshold decryption scheme based elliptic curve cryptography is presented.A zero-knowledge test approach based on elliptic curve cryptography is designed. The application ofthese techniques in Web security is studied. Performance analysis shows that our scheme is characterizedby excellent security as well as high efficiency.Key words intrusion tolerance; elliptic curve cryptography; threshold decryption; websecurityDespite all the defenses, some of the attacks willinevitably be successful. We must build intrusiontolerant systems that can operate through these attacks.The threshold cryptography provides newmethodology for developing intrusion tolerance system.The research on the threshold cryptography basedintrusion tolerance techniques concentrate on thresholdencryption, threshold decryption, thresholdauthentication and threshold signature. Generally,threshold encryption and threshold decryption arebased on the cryptography algorithms, which arehomomorphic, such as RSA. The homomorpohicproperty is necessary in order to generate shares of thekey so that partial cryptograms can be combined into acryptogram for the correct message[1]. Therefore,nearly all projects studying on threshold cryptographytechniques focused on the homomorphic algorithm.Among these, the intrusion tolerance via thresholdcryptography (ITTC) project developed by StanfordUniversity is notable, which researched anddeveloped the intrusion tolerance application basedon threshold RSA[2].Currently, elliptic curve cryptography (ECC) isregarded as an attractive cryptography that canprovide greater strength, higher speed and smallerkeys than other cryptography systems[3,4]. Therefore,the research on threshold ECC deserves greatattention. However, ECC is not homomorphic. It isdifficult to design ECC-based threshold schemes. So,there are not many public published papers orreports on ECC-based threshold schemes, especiallyon ECC-based threshold encryption or decryptionschemes. In this paper, we present an ECC basedthreshold decryption scheme and a zero-knowledgetest approach. And we apply our research results inbuilding intrusion tolerant Web security system.

评论
相关视频
  • 直播回放: Keysight 小探头,大学问,别让探头拖累你的测试结果!

  • 控制系统仿真与CAD

  • MIT 6.622 Power Electronics

  • 直播回放:基于英飞凌AIROC™ CYW20829低功耗蓝牙芯片的无线组网解决方案

  • 直播回放:ADI & WT·世健MCU痛点问题探索季:MCU应用难题全力击破!

  • Soc Design Lab - NYCU 2023

推荐帖子
精选电路图
  • PIC单片机控制的遥控防盗报警器电路

  • 使用ESP8266从NTP服务器获取时间并在OLED显示器上显示

  • 带有短路保护系统的5V直流稳压电源电路图

  • 如何构建一个触摸传感器电路

  • 如何调制IC555振荡器

  • 基于ICL296的大电流开关稳压器电源电路

×