Efficient ID-based Threshold Signature Schemes without Pairings

@article{Shao2006EfficientIT,
  title={Efficient ID-based Threshold Signature Schemes without Pairings},
  author={Jun Shao and Zhenfu Cao and Licheng Wang},
  journal={IACR Cryptology ePrint Archive},
  year={2006},
  volume={2006},
  pages={308}
}
The focus of this paper is to design an efficient and secure solution addressing the key escrow problem in ID-based signature schemes, i.e., the Private Key Generator (PKG) knows the user’s private key, which damages the essential requirement–“non-repudiation” property of signature schemes. In this paper, we proposed two ID-based threshold signature schemes, which both reach Girault’s trusted level 3, and in which there exists only one PKG in our ID-based threshold signature schemes. In… CONTINUE READING

References

Publications referenced by this paper.
Showing 1-10 of 15 references

Identity-Based Threshold Decryption

IACR Cryptology ePrint Archive • 2003

Ohgishi and M.Kasahara

K. R. Sakai
Cryptosystems based on pairing. In SCIS ’00, • 2000

The (in) security of distributed key generation in dlog-based cryptosystems

R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin
1999

Similar Papers

Loading similar papers…