Simulatability and security of certificateless threshold signatures
Information Sciences: an International Journal
Cryptographic techniques for mobile ad-hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
ID-Based (t,n) Threshold Proxy Signcryption for Multi-agent Systems
Computational Intelligence and Security
One-Round ID-Based Blind Signature Scheme without ROS Assumption
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
A secure identity-based threshold signature scheme from Tate pairings
ICAIT '08 Proceedings of the 2008 International Conference on Advanced Infocomm Technology
Bogus data filtering in sensor networks
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Multi-key hierarchical identity-based signatures
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Certificateless threshold signature scheme from bilinear maps
Information Sciences: an International Journal
An identity-based threshold signcryption scheme with semantic security
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Efficient tate pairing computation for elliptic curves over binary fields
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Token-controlled public key encryption
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
New ID-Based threshold signature scheme from bilinear pairings
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Identity-Based aggregate signatures
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Certificateless threshold signature secure in the standard model
Information Sciences: an International Journal
Linear threshold verifiable secret sharing in bilinear groups
International Journal of Grid and Utility Computing
Hi-index | 0.00 |
The focus of this paper is to formalize the concept ofidentity-based threshold signature and give the firstprovably secure scheme based on the bilinear pairings.An important feature of our scheme is that a privatekey associated with an identity rather than a masterkey of the Public Key Generator is shared amongsignature generation servers, which is more desirablein practice. Another interesting aspect of our results isthat the security of one of the verifiable secret sharingschemes used to construct the identity-based thresholdsignature scheme is relative to a slightly modifiedversion of the Generalized Tate Inversion problemrecently proposed by Joux.