Abstract
The threshold cryptography provides a new approach to building intrusion tolerance applications. In this paper, a threshold decryption scheme based the Menezes-Vanstone elliptic curve cryptosystem is presented. Based on the scheme, the architecture of an intrusion-tolerant Web security system is presented. Performance analysis shows that the architecture is characterized by excellent security as well as high efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Benaloh, J.C.: Secret sharing homomorphisms: keeping shares of a secret secret. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 251–260. Springer, Heidelberg (1987)
Malkin, M., Wu, T., Boneh, D.: Building Intrusion Tolerance Applications. In: 8th USENLX Security Symposium
Qiuliang, X., Daxing, L.: Elliptic curve cryptosystems[J]. Journal of Computer Research and Development 36(11), 1281–1288 (1999)
Xianfeng, Z., Zhiguang, Q., Jinde, L.: An analysis of the security and efficiency on elliptic curve cryptosystems. Journal of university of electronic science and technology of China 30(2), 144–147 (2001)
Takaragi, K., Miyazaki, K., et al.: . A threshold digital signature issuing scheme without secret communication, http://grouper.ieee.org/groups/1363/StudyGroup/contributions/th-sche.pdf
Wenyu, Z., Qi, S.: The application fundament of computer cryptography, pp. 174–175. Science Press, Beijing (2000)
Frankel, Y.: A practical protocol for large group oriented network. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 56–61. Springer, Heidelberg (1990)
Koblitz, N., Menezes, A., Vanstone, S.: The State of Elliptic Curve Cryptography. Designs, Codes and Cryptography, vol. 19, pp. 173–193 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, X., Zhang, F., Qin, Z., Liu, J. (2004). ECC Based Intrusion Tolerance for Web Security. In: Li, M., Sun, XH., Deng, Qn., Ni, J. (eds) Grid and Cooperative Computing. GCC 2003. Lecture Notes in Computer Science, vol 3032. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24679-4_179
Download citation
DOI: https://doi.org/10.1007/978-3-540-24679-4_179
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21988-0
Online ISBN: 978-3-540-24679-4
eBook Packages: Springer Book Archive