×

Simulatability and security of certificateless threshold signatures. (English) Zbl 1125.94039

Summary: We analyze the relationship between the notion of certificateless public key cryptography (CL-PKC) and identity-based schemes without a trusted private key generator (PKG), formally define the security of certificateless threshold signatures, and propose a concrete implementation based on bilinear pairings. To exhibit the security of our proposal, we develop the theory of simulatability and relationship between the certificateless threshold signatures and the underlying (non-threshold) ID-based signatures. We show that the proposed scheme is robust and existentially unforgeable against adaptively chosen message attacks under CDH assumption in the random oracle model.

MSC:

94A62 Authentication, digital signatures and secret sharing
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Al-Riyami, S. S.; Paterson, K. G., Certificateless public key cryptography, (Laih, C. S., Advances in Cryptology - ASIACRYPT 2003. Advances in Cryptology - ASIACRYPT 2003, LNCS 2894 (2003), Springer-Verlag), 452-473 · Zbl 1205.94072
[2] Backes, M.; Pfitzmann, B.; Steiner, M.; Waidner, M., Polynomial fairness and liveness, (Proc. 15th IEEE Computer Security Foundations Workshop (CSFW’02) (2002), IEEE Computer Society), 1063-1078
[3] Baek, J.; Safavi-Naini, R.; Susilo, W., Certificateless public key encryption without pairing, (Zhou, J.; etal., ISC 2005. ISC 2005, LNCS 3650 (2005), Springer-Verlag), 134-148 · Zbl 1127.94358
[4] Baek, J.; Zheng, Y., Identity-based threshold signature scheme from the bilinear pairings, (Proc. 2004 International Conference on Information Technology: Coding and Computing (ITCC 2004) (2004), IEEE Computer Society), 124-128
[5] Boneh, D.; Franklin, M., Identity-based encryption from the Weil pairing, (Kilian, J., Advances in Cryptology - CRYPTO 2001. Advances in Cryptology - CRYPTO 2001, LNCS 2139 (2001), Springer-Verlag), 213-229 · Zbl 1002.94023
[6] Chen, X.; Zhang, F.; Konidala, D. M.; Kim, K., New ID-based threshold signature scheme from bilinear pairing, (Canteaut, A.; Viswanathan, K., Advances in Cryptology - INDOCRYPT 2004. Advances in Cryptology - INDOCRYPT 2004, LNCS 3348 (2004), Springer-Verlag), 371-383 · Zbl 1113.94308
[7] S. Duan, Z. Cao, R. Lu, Robust ID-based threshold signcryption scheme from pairings, in: Proc. 2004 International Conference on Information Security, Shanghai, China, ACM ISBN:1-58113-955-1, 2004, pp. 33-37.; S. Duan, Z. Cao, R. Lu, Robust ID-based threshold signcryption scheme from pairings, in: Proc. 2004 International Conference on Information Security, Shanghai, China, ACM ISBN:1-58113-955-1, 2004, pp. 33-37. · Zbl 1091.94505
[8] R. Dutta, R. Barua, P. Sarkar, Pairing-based cryptographic protocols: a survey, Cryptology ePrint Archive: Report 2004/064.; R. Dutta, R. Barua, P. Sarkar, Pairing-based cryptographic protocols: a survey, Cryptology ePrint Archive: Report 2004/064.
[9] Girault, M., Self-certified public keys, (Davies, D. W., Advances in Cryptology - EUROCRYPT’91. Advances in Cryptology - EUROCRYPT’91, LNCS 547 (1991), Springer-Verlag), 490-497 · Zbl 0825.68374
[10] A. Joux, K. Nguyen, Separating decision Diffie-Hellman from Diffie-Hellman in cryptographic groups, Cryptology ePrint Archive: Report 2001/03.; A. Joux, K. Nguyen, Separating decision Diffie-Hellman from Diffie-Hellman in cryptographic groups, Cryptology ePrint Archive: Report 2001/03. · Zbl 1101.14309
[11] Shamir, A., Identity-based cryptosystems and signature schemes, (Blakley, G. R.; Chaum, D., Advances in Cryptology - CRYPTO’84. Advances in Cryptology - CRYPTO’84, LNCS 196 (1985), Springer-Verlag), 47-53 · Zbl 1359.94626
[12] Yao, A. C., Protocols for secure computations, (Proc. 23rd Symposium on Foundations of Computer Science (FOCS) (1982), IEEE Computer Society), 160-164
[13] Yum, D. H.; Lee, P. J., Generic construction of certificateless signature, (Wang, H.; etal., ACISP 2004. ACISP 2004, LNCS 3108 (2004), Springer-Verlag), 200-211 · Zbl 1098.94635
[14] Yum, D. H.; Lee, P. J., Generic construction of certificateless encryption, (Lagana, A.; etal., ICCSA 2004. ICCSA 2004, LNCS 3043 (2004), Springer-Verlag), 802-811 · Zbl 1108.68472
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.