Abstract
We analyze the relationship between the notion of certificateless public key cryptography (CL-PKC) and identity-based schemes without a trusted private key generator (PKG), formally define the security of certificateless threshold signatures, and propose a concrete implementation based on bilinear pairings. To exhibit the security of our proposal, we develop the theory of simulatability and relationship between the certificateless threshold signatures and the underlying (non-threshold) ID-based signatures. We show that the proposed scheme is robust and existentially unforgeable against adaptively chosen message attacks under CDH assumption in the random oracle model.
| Original language | English |
|---|---|
| Pages (from-to) | 1382-1394 |
| Number of pages | 13 |
| Journal | Information Sciences |
| Volume | 177 |
| Issue number | 6 |
| DOIs | |
| State | Published - 15 Mar 2007 |
| Externally published | Yes |
Keywords
- Certificateless
- Digital signature
- Key escrow
- Provable security
- Simulatabilty
- Threshold
Fingerprint
Dive into the research topics of 'Simulatability and security of certificateless threshold signatures'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver