J4

• Original Articles • Previous Articles     Next Articles

Provable secure ID-based threshold signature scheme without random oracles

ZHANG Le-you1,2;HU Yu-pu2;LIU Zhen-hua1,2
  

  1. (1. School of Science, Xidian Univ., Xi′an 710071, China; 2. Ministry of Education Key Lab. of Computer Network and Information Security, Xidian Univ., Xi′an 710071, China)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-02-20 Published:2008-01-20
  • Contact: ZHANG Le-you E-mail:lyzhang@mail.xidian.edu.cn

Abstract: A (t, n) threshold signature scheme is presented and is provably secure in the standard model. The proposed construction possesses public verifiability and detects the dishonest participants by using Gennaro’s distributed key generation (DKG) protocol and the bilinear pairing. Its key generation does not require a trusted dealer in the key generation protocol and only runs an interactive protocol among n participants. This new scheme proves robust and secure against existential forgery under the adaptive chosen message attack, assuming that the computation Diffie-Hellman assumption holds.

Key words: (t,n) threshold signature scheme, the standard model, provable secure, computation Diffie-Hellman assumption

CLC Number: 

  • TP309