TY - GEN
T1 - Certificateless threshold signature for data report authentication in mobile ad-hoc network
AU - Yang, Piyi
AU - Cao, Zhenfu
AU - Dong, Xiaolei
PY - 2009
Y1 - 2009
N2 - The focus of this paper is to design an efficient Certificateless Threshold Signature scheme (CLTHS) for data report authentication in mobile ad-hoc network, by which relatively small subsets of very large groups can report data that is aggregated and "certified" by means of a signature. Examples include vehicular networks where cars report traffic conditions, sensor networks that report aggregate data such as temperature or radiation levels, military devices transmitting information to be reported to various commands, and more. We first define the security notion for Certificateless Threshold Signature. Different from the adversarial model defined by Wang et al., our definition considers Type I and Type II adversary separately. At the same time, we develop the simulatability and relationship between certificateless threshold signature and the underlying certificateless signature. We also propose the first CLTHS scheme which is proved existentially unforgeable against adaptively chosen message attack without random oracles. Compared with the previous scheme, our scheme is much more efficient.
AB - The focus of this paper is to design an efficient Certificateless Threshold Signature scheme (CLTHS) for data report authentication in mobile ad-hoc network, by which relatively small subsets of very large groups can report data that is aggregated and "certified" by means of a signature. Examples include vehicular networks where cars report traffic conditions, sensor networks that report aggregate data such as temperature or radiation levels, military devices transmitting information to be reported to various commands, and more. We first define the security notion for Certificateless Threshold Signature. Different from the adversarial model defined by Wang et al., our definition considers Type I and Type II adversary separately. At the same time, we develop the simulatability and relationship between certificateless threshold signature and the underlying certificateless signature. We also propose the first CLTHS scheme which is proved existentially unforgeable against adaptively chosen message attack without random oracles. Compared with the previous scheme, our scheme is much more efficient.
KW - Certificateless threshold signature
KW - Data report authentication
KW - Mobile ad-hoc network
UR - https://www.scopus.com/pages/publications/72849143356
U2 - 10.1109/NSS.2009.11
DO - 10.1109/NSS.2009.11
M3 - 会议稿件
AN - SCOPUS:72849143356
SN - 9780769538389
T3 - NSS 2009 - Network and System Security
SP - 143
EP - 150
BT - NSS 2009 - Network and System Security
T2 - 2009 3rd International Conference on Network and System Security, NSS 2009
Y2 - 19 October 2009 through 21 October 2009
ER -