ZHANG Xian-feng, ZHANG Feng, QIN Zhi-guang, LIU Jin-de. ECC Based Threshold Decryption Scheme and Its Application in Web Security[J]. Journal of Electronic Science and Technology, 2004, 2(4): 41-46.
Citation: ZHANG Xian-feng, ZHANG Feng, QIN Zhi-guang, LIU Jin-de. ECC Based Threshold Decryption Scheme and Its Application in Web Security[J]. Journal of Electronic Science and Technology, 2004, 2(4): 41-46.

ECC Based Threshold Decryption Scheme and Its Application in Web Security

Funds: 

Supported by the Foundation of National 863 Programme of China (No. 2002AA142040)

More Information
  • Author Bio:

    ZHANG Xian-feng research interests include information and network security, zhangxf@uestc.edu.cn;
    ZHANG Feng, ibmcenter@uestc.edu.cn;
    QIN Zhi-guang, qinzg@uestc.edu.cn;
    LIU Jin-de, jdliu@uestc.edu.cn

    ZHANG Xian-feng research interests include information and network security, zhangxf@uestc.edu.cn;
    ZHANG Feng, ibmcenter@uestc.edu.cn;
    QIN Zhi-guang, qinzg@uestc.edu.cn;
    LIU Jin-de, jdliu@uestc.edu.cn

    ZHANG Xian-feng research interests include information and network security, zhangxf@uestc.edu.cn;
    ZHANG Feng, ibmcenter@uestc.edu.cn;
    QIN Zhi-guang, qinzg@uestc.edu.cn;
    LIU Jin-de, jdliu@uestc.edu.cn

    ZHANG Xian-feng research interests include information and network security, zhangxf@uestc.edu.cn;
    ZHANG Feng, ibmcenter@uestc.edu.cn;
    QIN Zhi-guang, qinzg@uestc.edu.cn;
    LIU Jin-de, jdliu@uestc.edu.cn

  • Received Date: 2003-10-07
  • Publish Date: 2004-12-24
  • The threshold cryptography provides a new approach to building intrusion tolerance applications. In this paper, a threshold decryption scheme based elliptic curve cryptography is presented. A zero-knowledge test approach based on elliptic curve cryptography is designed. The application of these techniques in Web security is studied. Performance analysis shows that our scheme is characterized by excellent security as well as high efficiency.
  • Related Articles

    [1]Chi-Shiang Chan, Yi-Hui Chen, Yuan-Yu Tsai. Guest Editorial:Special Issue on Information Security and Applications[J]. Journal of Electronic Science and Technology, 2017, 15(3): 209-210. DOI: 10.11989/JEST.1674-862X.60804019
    [2]Xiang Liu, Zhi-Guang Qin, Jie Shen. Mobile Web Middleware of NFC Context-Awareness Applications[J]. Journal of Electronic Science and Technology, 2013, 11(4): 388-392. DOI: 10.3969/j.issn.1674-862X.2013.04.010
    [3]Chin-Fu Kuo, Yung-Feng Lu, Chi-Ying Chen. Security-State Adjustable Gateway with Threat-Based Configuration[J]. Journal of Electronic Science and Technology, 2013, 11(2): 140-149. DOI: 10.3969/j.issn.1674-862X.2013.02.005
    [4]Chin-Chen Chang, Ming-Shiang Hwang. Special Issue on Network and Communication Security[J]. Journal of Electronic Science and Technology, 2012, 10(3): 193-194. DOI: 10.3969/j.issn.1674-862X.2012.03.001
    [5]Bing Zhang, Xin-Xin Ma, Zhi-Guang Qin. Security Architecture on the Trusting Internet of Things[J]. Journal of Electronic Science and Technology, 2011, 9(4): 364-367. DOI: 10.3969/j.issn.1674-862X.2011.04.014
    [6]Chin-Chen Chang, Chia-Chen Lin. Guest Editorial: Special Issue on Information Security[J]. Journal of Electronic Science and Technology, 2011, 9(4): 289-290. DOI: 10.3969/j.issn.1674-862X.2011.04.001
    [7]Lun Cai, Jing-Ling Liu, Xi Wang. Implementation Method of Non-Intrusive Monitoring Mechanism for Web Services Testing[J]. Journal of Electronic Science and Technology, 2009, 7(3): 207-213.
    [8]FEI Chun, TANG Xue-fei. Research on the E-Learning Application of Web Service[J]. Journal of Electronic Science and Technology, 2005, 3(3): 218-221.
    [9]QIN Zhiguang, LUO Xucheng, GAO Rong. A Survey of E-Commerce Security[J]. Journal of Electronic Science and Technology, 2004, 2(3): 173-176,199.
    [10]LUO Huiqiong, WANG Jiahao, ZHAO Qiang. On an Interactive Network Security Measure[J]. Journal of Electronic Science and Technology, 2004, 2(1): 35-37.
  • Catalog

      Article Metrics

      Article views (344) PDF downloads (45) Cited by()
      Related
      Proportional views

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return