Fully distributed certificateless threshold signature without random oracles
نویسندگان
چکیده
منابع مشابه
Efficient certificateless threshold signatures without random oracles
This paper defines the security notion for Certificateless Threshold Signatures (CLTHS). Different from the adversarial model defined by Wang, et al. (2007), our definition considers Type I and Type II adversary separately. At the same time, the authors develop the simulatability and relationship between certificateless threshold signature and the underlying certificateless signature. We also p...
متن کاملToward Certificateless Signcryption Scheme Without Random Oracles
Signcryption is a useful paradigm which simultaneously offers both the functions of encryption and signature in a single logic step. It would be interesting to make signcryption certificateless to ease the heavy burden of certificate management in traditional public key cryptography (PKC) and solve the key escrow problem in Identity-based public key cryptography (ID-PKC). Most certificateless s...
متن کاملEfficient Linkable and/or Threshold Ring Signature Without Random Oracles
Linkable ring signatures have found many attractive applications. One of the recent important extensions is a linkable threshold ring signature (LTRS) scheme. Unfortunately, the existing LTRS schemes are only secure in the random oracle model (ROM). In this paper, we make the following contributions. First, we construct the first LTRS scheme that is secure without requiring the ROM. Further, we...
متن کاملNon-Interactive Forward-Secure Threshold Signature without Random Oracles
JIA YU, FAN-YU KONG, HUA-WEI ZHAO, XIANG-GUO CHENG, RONG HAO AND XIANG-FA GUO College of Information Engineering Qingdao University Qingdao, 266071 P.R. China Institute of Network Security Shandong University Jinan, 250100 P.R. China School of Computer and Information Engineering Shandong University of Finance Jinan, 250014 P.R. China Department of Computer Science National University of Singap...
متن کاملDesignated Verifier Threshold Proxy Signature Scheme without Random Oracles
In a (t, n) designated verifier threshold proxy signature scheme, an original signer can delegate his/her signing power to n proxy signers such that any t or more out of n proxy signers can sign messages on behalf of the original signer but t− 1 or less of the proxy signers cannot generate a valid proxy signature. Of course, the signature is issued for a designated receiver and therefore only t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science China Information Sciences
سال: 2018
ISSN: 1674-733X,1869-1919
DOI: 10.1007/s11432-017-9244-9