Certificateless threshold signature scheme from bilinear maps
From MaRDI portal
Publication:621600
DOI10.1016/j.ins.2010.07.021zbMath1208.94062OpenAlexW2013501977MaRDI QIDQ621600
Willy Susilo, Hong Yuan, Lei Zhang, Yi Mu, Xin-Yi Huang, Fu-Tai Zhang
Publication date: 28 January 2011
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2010.07.021
Related Items
Computing elliptic curve discrete logarithms with the negation map ⋮ Provably secure threshold public-key encryption with adaptive security and short ciphertexts ⋮ Concurrent signature without random oracles ⋮ Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model ⋮ Notes on the security of certificateless aggregate signature schemes ⋮ Black-box constructions of signature schemes in the bounded leakage setting ⋮ Practical (fully) distributed signatures provably secure in the standard model
Cites Work
- Unnamed Item
- Unnamed Item
- Certificateless threshold ring signature
- Certificateless signcryption scheme in the standard model
- Simulatability and security of certificateless threshold signatures
- Secure distributed key generation for discrete-log based cryptosystems
- Breaking the short certificateless signature scheme
- Robust threshold DSS signatures
- Simulatable certificateless two-party authenticated key agreement protocol
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
- Identity-Based Cryptosystems and Signature Schemes
- Certificateless Signature Revisited
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Information Security and Privacy
- Progress in Cryptology - INDOCRYPT 2004
- Key Replacement Attack Against a Generic Construction of Certificateless Signature
- Cryptology and Network Security
- Applied Cryptography and Network Security
- Public Key Cryptography – PKC 2004
- Advances in Cryptology - ASIACRYPT 2003