Certificateless Threshold Signature Schemes

  • Licheng Wang
  • Zhenfu Cao
  • Xiangxue Li
  • Haifeng Qian
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3802)


We analyze the relationship and subtle difference between the notion of certificateless public key cryptography (CL-PKC) and identity-based schemes without a trusted private key generator (PKG), then propose a certificateless threshold signature scheme based on bilinear pairings. The proposed scheme is robust and existentially unforgeable against adaptive chosen message attacks under CDH assumption in the random oracle model.


Signature Scheme Bilinear Pairing Random Oracle Model Signcryption Scheme Threshold Signature Scheme 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  2. 2.
    Ratna, D., Rana, B., Palash, S.: Pairing-Based Cryptographic Protocols: A Survey. Cryptology ePrint Archive: Report 2004/064 (2004)Google Scholar
  3. 3.
    Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490–497. Springer, Heidelberg (1991)Google Scholar
  4. 4.
    Pedersen, T.P.: Non-Interactive and Information-Theorectic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)Google Scholar
  5. 5.
    Sattam, S.A., Kenneth, G.P.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Dae, H.Y., Pil, J.L.: Generic Construction of Certificateless Signature. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 200–211. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    Dae, H.Y., Pil, J.L.: Generic Construction of Certificateless Encryption. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 802–811. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  8. 8.
    Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  9. 9.
    Chen, X., Zhang, F., Divyao, M.K., Kwangjo, K.: New ID-Based Threshold Signature Scheme from Bilinear Pairing. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 371–383. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Duan, S., Cao, Z., Lu, R.: Robust ID-based Threshold signcryption Scheme From Pairings. In: ACM InfoSecu 2004, pp. 33–37 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Licheng Wang
    • 1
  • Zhenfu Cao
    • 1
  • Xiangxue Li
    • 1
  • Haifeng Qian
    • 1
  1. 1.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina

Personalised recommendations