Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Communications of the ACM
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Identity-Based Threshold Signature Scheme from the Bilinear Pairings
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Simulatability and security of certificateless threshold signatures
Information Sciences: an International Journal
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Journal of Cryptology
Malicious KGC attacks in certificateless cryptography
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Certificateless undeniable signature scheme
Information Sciences: an International Journal
Breaking the short certificateless signature scheme
Information Sciences: an International Journal
Certificateless Threshold Ring Signature
Information Sciences: an International Journal
Certificateless signcryption scheme in the standard model
Information Sciences: an International Journal
Robust threshold DSS signatures
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Certificateless signature revisited
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Practical threshold signatures without random oracles
ProvSec'07 Proceedings of the 1st international conference on Provable security
Short threshold signature schemes without random oracles
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
On the security of certificateless signature schemes from asiacrypt 2003
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
New ID-Based threshold signature scheme from bilinear pairings
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Certificateless public-key signature: security model and efficient construction
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Efficient identity-based signatures secure in the standard model
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Key replacement attack against a generic construction of certificateless signature
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
On security of a certificateless signcryption scheme
Information Sciences: an International Journal
Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
Information Sciences: an International Journal
Hi-index | 0.07 |
Threshold signature is an extension of the standard signature, in which several signers may be required to cooperatively sign messages for sharing the responsibility and authority. Certificateless cryptography eliminates the need of certificates in the Public Key Infrastructure and solves the inherent key-escrow problem in the Identity-based (ID-based) cryptography. In this paper, we propose a certificateless threshold signature scheme with concrete implementation which is provably secure in the standard model. Furthermore, this scheme is proven secure against the malicious-but-passive KGC attack. To the best of author's knowledge, this is the first construction of certificateless threshold signature scheme that does not rely on random oracle or ideal ciphers.