期刊文献+

EFFICIENT CERTIFICATELESS THRESHOLD SIGNATURES WITHOUT RANDOM ORACLES

EFFICIENT CERTIFICATELESS THRESHOLD SIGNATURES WITHOUT RANDOM ORACLES
原文传递
导出
摘要 This paper defines the security notion for Certificateless Threshold Signatures (CLTHS). Different from the adversarial model defined by Wang, et al. (2007), our definition considers Type I and Type II adversary separately. At the same time, the authors develop the simulatability and relationship between certificateless threshold signature and the underlying certificateless signature. We also propose the first CLTHS scheme which is proved existentially unforgeable against adaptively chosen message attack without random oracles. Compared with the previous scheme by Wang, et al. (2007), our scheme does not use hash function and is more efficient.
出处 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2010年第6期1167-1182,共16页 系统科学与复杂性学报(英文版)
基金 This research is supported by the National Natural Science Foundation of China under Grant Nos. 60773086, 60970110, 60972034, and the National 973 Program under Grant No. 2007CB311201.
  • 相关文献

参考文献31

  • 1A. Shamir, Identity-Based Cryptosystems and Signature Schemes, ed. by G. R. Blakley, D. Chaum, Advances in Cryptology - CRYPTO84, LNCS 196, Springer-Verlag, 1985: 47-53.
  • 2S. S. A1-Riyami and K. G. Paterson, Certificateless Public Key Cryptography, ed. by C. S. Laih, Advances in Cryptology ASIACRYPT 2003, LNCS 2894, Springer-Verlag, 2003:452 473.
  • 3S. S. A1-Riyami and K. G. Paterson, Certificateless public key cryptography, in Proceedings of the Ninth International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, 2003: 452-473.
  • 4J. Baek, R. Safavi-Naini, and W. Susilo, Certificateless Public Key Encryption Without Pairing, ed. by J. Zhou, et al., ISC 2005, LNCS 365, Springer-Verlag, 2005: 134-148.
  • 5D. H. Yum and P. J. Lee, Generic Construction of Certificateless Signature, ed. by H. Wang, et al., ACISP 2004, LNCS 3108, Springer-Verlag, 2004: 200-211.
  • 6D. H. Yum and P. J. Lee, Generic Construction of Certificateless Encryption, ed. by A. Lagana, et al., ICCSA 2004, LNCS 3043, Springer-Verlag, 2004: 802-811.
  • 7C. J. Wang, D. Y. Long, and Y. Tang, An efficient certificateless signature from pairings, International Journal of Network Security, 2009, 8(1): 146-150.
  • 8Z. Xu, X. Liu, G. Q. Zhang, et al., A Certificateless Signature Scheme for Mobile Wireless Cyber- Physical Systems, in 28th International Conference on Distributed Computing Systems Workshops 2008 (ICDCS '08), 2008: 489-494.
  • 9A. Shamir, How to share a secret, Communications of the ACM, 1979, 22(11): 612-613.
  • 10Blakley GR, Safeguarding cryptographic keys, Proceedings of AFIPS National Computer Conference, Arlington, VA, 1979, 48: 313-317.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部