Certificateless threshold signature schemes

8Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We analyze the relationship and subtle difference between the notion of certificateless public key cryptography (CL-PKC) and identity-based schemes without a trusted private key generator (PKG), then propose a certificateless threshold signature scheme based on bilinear pairings. The proposed scheme is robust and existentially unforgeable against adaptive chosen message attacks under CDH assumption in the random oracle model. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Wang, L., Cao, Z., Li, X., & Qian, H. (2005). Certificateless threshold signature schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3802 LNAI, pp. 104–109). Springer Verlag. https://doi.org/10.1007/11596981_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free