Fully distributed certificateless threshold signature without random oracles

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient certificateless threshold signatures without random oracles

This paper defines the security notion for Certificateless Threshold Signatures (CLTHS). Different from the adversarial model defined by Wang, et al. (2007), our definition considers Type I and Type II adversary separately. At the same time, the authors develop the simulatability and relationship between certificateless threshold signature and the underlying certificateless signature. We also p...

متن کامل

Toward Certificateless Signcryption Scheme Without Random Oracles

Signcryption is a useful paradigm which simultaneously offers both the functions of encryption and signature in a single logic step. It would be interesting to make signcryption certificateless to ease the heavy burden of certificate management in traditional public key cryptography (PKC) and solve the key escrow problem in Identity-based public key cryptography (ID-PKC). Most certificateless s...

متن کامل

Efficient Linkable and/or Threshold Ring Signature Without Random Oracles

Linkable ring signatures have found many attractive applications. One of the recent important extensions is a linkable threshold ring signature (LTRS) scheme. Unfortunately, the existing LTRS schemes are only secure in the random oracle model (ROM). In this paper, we make the following contributions. First, we construct the first LTRS scheme that is secure without requiring the ROM. Further, we...

متن کامل

Non-Interactive Forward-Secure Threshold Signature without Random Oracles

JIA YU, FAN-YU KONG, HUA-WEI ZHAO, XIANG-GUO CHENG, RONG HAO AND XIANG-FA GUO College of Information Engineering Qingdao University Qingdao, 266071 P.R. China Institute of Network Security Shandong University Jinan, 250100 P.R. China School of Computer and Information Engineering Shandong University of Finance Jinan, 250014 P.R. China Department of Computer Science National University of Singap...

متن کامل

Designated Verifier Threshold Proxy Signature Scheme without Random Oracles

In a (t, n) designated verifier threshold proxy signature scheme, an original signer can delegate his/her signing power to n proxy signers such that any t or more out of n proxy signers can sign messages on behalf of the original signer but t− 1 or less of the proxy signers cannot generate a valid proxy signature. Of course, the signature is issued for a designated receiver and therefore only t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science China Information Sciences

سال: 2018

ISSN: 1674-733X,1869-1919

DOI: 10.1007/s11432-017-9244-9