Non-Interactive Forward-Secure Threshold Signature without Random Oracles

نویسندگان

  • Jia Yu
  • Fanyu Kong
  • Huawei Zhao
  • Xiangguo Cheng
  • Rong Hao
  • Xiang-Fa Guo
چکیده

JIA YU, FAN-YU KONG, HUA-WEI ZHAO, XIANG-GUO CHENG, RONG HAO AND XIANG-FA GUO College of Information Engineering Qingdao University Qingdao, 266071 P.R. China Institute of Network Security Shandong University Jinan, 250100 P.R. China School of Computer and Information Engineering Shandong University of Finance Jinan, 250014 P.R. China Department of Computer Science National University of Singapore 117590 Singapore

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical Threshold Signatures Without Random Oracles

We propose a secure threshold signature scheme without trusted dealer. Our construction is based on the recently proposed signature scheme of Waters in EUROCRYPT’05. The new threshold signature scheme is more efficient than the previous threshold signature schemes without random oracles. Meanwhile, the signature share generation and verification algorithms are non-interactive. Furthermore, it i...

متن کامل

Forward Secure Ring Signature without Random Oracles

In this paper, we propose a forward secure ring signature scheme without random oracles. With forward security, if a secret key of a corresponding ring member is exposed, all previously signed signatures containing this member remain valid. Yet the one who has stolen the secret key cannot produce any valid signature belonged to the past time period. This is especially useful in the case of ring...

متن کامل

Fine-grained forward-secure signature schemes without random oracles

We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide non-repudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period remain valid when revoking the public key. This is an important advantage if the signer produces man...

متن کامل

Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles

We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our construction uses the recent identity based encryption system of Boneh and Boyen and the chosen ciphertext secure construction of Canetti, Halevi, and Katz.

متن کامل

Non-interactive Identity-Based DNF Signature Scheme and Its Extensions

An ID-based DNF signature scheme is an ID-based signature scheme with an access structure which is expressed as a disjunctive normal form (DNF) with literals of signer identities. ID-based DNF signature schemes are useful to achieve not only signer-privacy but also a multi-user access control. In this paper, we formally define a notion of a (non-interactive) ID-based DNF signature and propose t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 28  شماره 

صفحات  -

تاریخ انتشار 2012