Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Robust threshold DSS signatures
Information and Computation
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Identity-Based Threshold Signature Scheme from the Bilinear Pairings
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Simulatability and security of certificateless threshold signatures
Information Sciences: an International Journal
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Journal of Cryptology
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A practical scheme for non-interactive verifiable secret sharing
SFCS '87 Proceedings of the 28th Annual Symposium on Foundations of Computer Science
Breaking the short certificateless signature scheme
Information Sciences: an International Journal
Simulatability and Security of Certificateless Threshold Signatures without Random Oracles
CIS '08 Proceedings of the 2008 International Conference on Computational Intelligence and Security - Volume 02
A new certificateless aggregate signature scheme
Computer Communications
Certificateless Threshold Ring Signature
Information Sciences: an International Journal
Certificateless signcryption scheme in the standard model
Information Sciences: an International Journal
Simulatable certificateless two-party authenticated key agreement protocol
Information Sciences: an International Journal
Certificateless signature revisited
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
On the security of certificateless signature schemes from asiacrypt 2003
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
New ID-Based threshold signature scheme from bilinear pairings
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Certificateless public-key signature: security model and efficient construction
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Key replacement attack against a generic construction of certificateless signature
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
A crypto-biometric scheme based on iris-templates with fuzzy extractors
Information Sciences: an International Journal
Computing elliptic curve discrete logarithms with the negation map
Information Sciences: an International Journal
Provably secure threshold public-key encryption with adaptive security and short ciphertexts
Information Sciences: an International Journal
On security of a certificateless signcryption scheme
Information Sciences: an International Journal
Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
Information Sciences: an International Journal
Hi-index | 0.07 |
A (t,n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members. In contrast to the traditional public key cryptography based on public key infrastructure (PKI) and identity-based public key cryptography (ID-PKC), certificateless public key cryptography (CL-PKC) offers useful properties as it does not require any certificates to ensure the authenticity of public keys and the key escrow problem is eliminated. In this paper, we investigate the notion of threshold signature schemes in CL-PKC. We start by pointing out the drawbacks in the two existing certificateless threshold signature schemes. Subsequently, we present an elaborate description of a generic certificateless (t,n) threshold signature scheme with a new security model. The adversaries captured in the new model are more powerful than those considered in the existing schemes. Furthermore, we establish the simulatability for certificateless threshold signature schemes and prove the relationship between the security of certificateless threshold signature schemes and that of the underlying non-threshold certificateless signature schemes. As an instantiation, we present a concrete certificateless threshold signature scheme based on bilinear maps using the techniques of verifiable secret sharing and distributed key generation. The proposed scheme is shown to be existentially unforgeable against adaptively chosen message attacks assuming the hardness of Computational Diffie-Hellman (CDH) problem.