Efficient certificateless threshold signatures without random oracles

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

This paper defines the security notion for Certificateless Threshold Signatures (CLTHS). Different from the adversarial model defined by Wang, et al. (2007), our definition considers Type I and Type II adversary separately. At the same time, the authors develop the simulatability and relationship between certificateless threshold signature and the underlying certificateless signature. We also propose the first CLTHS scheme which is proved existentially unforgeable against adaptively chosen message attack without random oracles. Compared with the previous scheme by Wang, et al. (2007), our scheme does not use hash function and is more efficient.

Original languageEnglish
Pages (from-to)1167-1182
Number of pages16
JournalJournal of Systems Science and Complexity
Volume23
Issue number6
DOIs
StatePublished - 2010
Externally publishedYes

Keywords

  • Certificateless
  • digital signature
  • key escrow
  • provable security
  • robustness
  • simulatabiltiy
  • threshold

Fingerprint

Dive into the research topics of 'Efficient certificateless threshold signatures without random oracles'. Together they form a unique fingerprint.

Cite this