Abstract
This paper defines the security notion for Certificateless Threshold Signatures (CLTHS). Different from the adversarial model defined by Wang, et al. (2007), our definition considers Type I and Type II adversary separately. At the same time, the authors develop the simulatability and relationship between certificateless threshold signature and the underlying certificateless signature. We also propose the first CLTHS scheme which is proved existentially unforgeable against adaptively chosen message attack without random oracles. Compared with the previous scheme by Wang, et al. (2007), our scheme does not use hash function and is more efficient.
Similar content being viewed by others
References
A. Shamir, Identity-Based Cryptosystems and Signature Schemes, ed. by G. R. Blakley, D. Chaum, Advances in Cryptology — CRYPTO84, LNCS 196, Springer-Verlag, 1985: 47–53.
S. S. Al-Riyami and K. G. Paterson, Certificateless Public Key Cryptography, ed. by C. S. Laih, Advances in Cryptology-ASIACRYPT 2003, LNCS 2894, Springer-Verlag, 2003: 452–473.
S. S. Al-Riyami and K. G. Paterson, Certificateless public key cryptography, in Proceedings of the Ninth International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, 2003: 452–473.
J. Baek, R. Safavi-Naini, and W. Susilo, Certificateless Public Key Encryption Without Pairing, ed. by J. Zhou, et al., ISC 2005, LNCS 365, Springer-Verlag, 2005: 134–148.
D. H. Yum and P. J. Lee, Generic Construction of Certificateless Signature, ed. by H. Wang, et al., ACISP 2004, LNCS 3108, Springer-Verlag, 2004: 200–211.
D. H. Yum and P. J. Lee, Generic Construction of Certificateless Encryption, ed. by A. Lagana, et al., ICCSA 2004, LNCS 3043, Springer-Verlag, 2004: 802–811.
C. J. Wang, D. Y. Long, and Y. Tang, An efficient certificateless signature from pairings, International Journal of Network Security, 2009, 8(1): 146–150.
Z. Xu, X. Liu, G. Q. Zhang, et al., A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems, in 28th International Conference on Distributed Computing Systems Workshops 2008 (ICDCS’ 08), 2008: 489–494.
A. Shamir, How to share a secret, Communications of the ACM, 1979, 22(11): 612–613.
Blakley GR, Safeguarding cryptographic keys, Proceedings of AFIPS National Computer Conference, Arlington, VA, 1979, 48: 313–317.
M. Cerecedo, M. Matsumoto, and H. Imai, Efficient and secure multiparty generation of digital signatures based on discrete logarithms, IEICE Trans, Fundamentals, 1IEICE, 1993, E76-A: 532–545.
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, Secure distributed key generation for discrete-log based cryptosystem, Proc. of EUROCRYPT’99, LNCS 1592, Springer-Verlag, 1999, 295–310.
C. Boyd, Digital multisignatures, in H. Baker and F. Piper, editors, Cryptography and Coding, Claredon Press, 1989: 241–246.
R. A. Croft and S. P. Harris, Public-Key Cryptography and Re-Usable Shared Secrets, ed. by H. Baker and F. Piper, Cryptography and Coding, Claredon Press, 1989: 189–201.
Y. Desmedt, Society and group oriented cryptography: A new concept, Crypto’87, LNCS, 1987, 293: 120–127.
Alfredo De Santis, Yvo Desmedt, et al., How to share a function securely, Proc. 26th STOC, ACM, 1994: 522–533.
Y. Desmedt and Y. Frankel, Shared generation of authenticators and signatures, Crypto’91, LNCS, 1991, 576: 457–469.
Y. Frankel, P. Gemmell, P. Mackenzie, and M. Yung, Proactive RSA, Crypto’97, 1294: 440–454.
Y. Frankel, P. Gemmell, and M. Yung, Witness-based cryptographic program checking and robust function sharing, Proc, 28th STOC, 1996: 499–508.
R. Gennaro, H. Krawczyk, and T. Rabin, Robust and efficient sharing of RSA functions, Journal of Cryptology, 2000, 13(2): 273–300.
V. Shoup, Practical threshold signatures, Eurocrypt’00, LNCS, 2000, 1807: 207–220.
M. Cerecedo, T. Matsumoto, and H. Imai, Efficient and secure multiparty generation of digital signatures based on discrete logarithms, IEICE Trans. Fundamentals, 1993, E76-A(4): 532–545.
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, Robust Threshold DSS Signatures, Information and Computation, Extended abstract in EUROCRYPT’96, 2001, 164(1): 54–84.
S. Duan, Z. Cao, and R. Lu, Robust ID-based threshold signcryption scheme from pairings, Proc. 2004 International Conference on Information Security, Shanghai, China, ACM ISBN: 1-58113-955-1, 2004: 33–37.
Vanesa Daza, Javier Herranz, and German Saez, Database and expert systems applications, 2003, proceedings, 14th international workshop on 1–5 Sept. 2003: 359–363.
L. C. Wang, Z. F. Cao, X. X. Li, and H. F. Qian, Simulatability and security of certificateless threshold signatures, Information Sciences, 2007, 177(6): 1382–1394.
D. Boneh and M. Franklin, Identity-based encryption from the weil pairing, SIAM Journal of Computing, 2003, 32(3): 586–615.
A. Joux and K. Nguyen, Separating decision Diffie-Hellman from Diffie-Hellman in cryptographic groups, Cryptology, ePrint Archive: Report 2001/03.
R. Gennaro, S. Halevi, and T. Rabin, Secure hash-and-sign signatures without the random oracle, Proceedings of Eurocrypt 1999, LNCS, Springer-Verlag, 1999: 123–139.
B. Waters, Efficient identity-based encryption without random oracles, EUROCRYPT 2005, volume 3494 of Lecture Notes in Computer Science, Springer-Verlag, 2005: 114–127.
X. Chen, F. Zhang, D. M. Konidala, and K. Kim, New ID-based threshold signature scheme from bilinear pairing, ed. by A. Canteaut, K. Viswanathan, Advances in Cryptology-INDOCRYPT 2004, LNCS 3348, Springer-Verlag, 2004: 371–383.
Author information
Authors and Affiliations
Corresponding author
Additional information
This research is supported by the National Natural Science Foundation of China under Grant Nos. 60773086, 60970110, 60972034, and the National 973 Program under Grant No. 2007CB311201.
Rights and permissions
About this article
Cite this article
Yang, P., Cao, Z. & Dong, X. Efficient certificateless threshold signatures without random oracles. J Syst Sci Complex 23, 1167–1182 (2010). https://doi.org/10.1007/s11424-010-7274-y
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11424-010-7274-y