Adaptively Secure Threshold Signature Scheme in the Standard Model
نویسندگان
چکیده
منابع مشابه
Adaptively Secure Threshold Signature Scheme in the Standard Model
We propose a distributed key generation protocol for pairing-based cryptosystems which is adaptively secure in the erasure-free and secure channel model, and at the same time completely avoids the use of interactive zero-knowledge proofs. Utilizing it as the threshold key generation protocol, we present a secure (t, n) threshold signature scheme based on the Waters’ signature scheme. We prove t...
متن کاملIdentity-based Threshold Signature Secure in the Standard Model
Recently, design of Identity-based (ID-based) threshold signature schemes which are efficient and provably secure in the standard model has drawn great concerns. In this paper, an ID-based threshold signature scheme based on Paterson and Schuldt’s signature scheme is presented. The proposed construction is proved secure in the standard model and its security rests on the hardness of the computa...
متن کاملID-Based Ring Signature Scheme Secure in the Standard Model
The only known construction of ID-based ring signature schemes which maybe secure in the standard model is to attach certificates to non-ID-based ring signatures. This method leads to schemes that are somewhat inefficient and it is an open problem to find more efficient and direct constructions. In this paper, we propose two such constructions. Our first scheme, with signature size linear in th...
متن کاملSecure Identity-Based Blind Signature Scheme in the Standard Model
The only known construction of identity-based blind signature schemes that are secure in the standard model is based on the generic approach of attaching certificates to ordinary (i.e. non-identity-based) blind signature schemes, and thus the identity-based blind signature schemes constructed using this method are somewhat inefficient and have long signature size. In this paper, we present the ...
متن کاملA Certificateless Proxy Signature Scheme Secure In Standard Model
A proxy signature scheme allows one user to delegate his/her signing authority to another user called a proxy signer in such a way that the latter can sign messages on behalf of the former. Moreover, after verification, the verifier is convinced of the original signer’s agreement on the signed message. There exist several certificateless proxy signature schemes in the literature, but all of the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Informatica
سال: 2009
ISSN: 0868-4952,1822-8844
DOI: 10.15388/informatica.2009.268