A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Communications of the ACM
Modified Maurer-Yacobi`s scheme and its applications
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
An Identity-Based Signature and Its Threshold Version
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
Simulatability and security of certificateless threshold signatures
Information Sciences: an International Journal
Optimal resilient threshold GQ signatures
Information Sciences: an International Journal
A novel efficient (t,n) threshold proxy signature scheme
Information Sciences: an International Journal
Universally convertible directed signatures
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle
ISNN 2009 Proceedings of the 6th International Symposium on Neural Networks: Advances in Neural Networks - Part III
Efficient threshold proxy signature protocol for mobile agents
Information Sciences: an International Journal
Privacy preservation with X.509 standard certificates
Information Sciences: an International Journal
Hi-index | 0.07 |
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can verify the signature with the help of the signer or the designated verifier as well. Due to its merits, directed signature scheme is widely used in situations where the receiver's privacy should be protected. Threshold directed signature is an extension of the standard directed signature, in which several signers may be required to cooperatively sign messages for sharing the responsibility and authority. To the best of our knowledge, threshold directed signature has not been well studied till now. Therefore, in this paper, we would like to formalize the threshold directed signature and its security model, then present a new (t,n) threshold directed signature scheme from bilinear pairings and use the techniques from provable security to analyze its security.