Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2008, Vol. 9 Issue (6): 727-736    DOI: 10.1631/jzus.A0720028
Electrical & Electronic Engineering     
Non-interactive identity-based threshold signature scheme without random oracles
Xun SUN, Jian-hua LI, Shu-tang YANG, Gong-liang CHEN
Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai 200240, China; School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  A (t, n) threshold signature scheme distributes the secret key and hence the signing ability to n players in a way that any set of t+1 or more honest players can collaborate to sign, while any set of t players cannot. In this paper we propose an identity-based threshold signature (IBTHS) scheme from bilinear pairings. The signing phase of our scheme is non-interactive, meaning that the signing players do not need to talk to each other. We prove our scheme secure (i.e., unforgeable and robust) in the standard model (i.e., without random oracles). No earlier proposed IBTHS scheme achieved even one of the features of being non-interactive (in the signing phase) and secure in the standard model.

Key wordsBilinear pairings      Identity-based threshold signature (IBTHS)      Standard model     
Received: 15 October 2007     
CLC:  TP311  
Cite this article:

Xun SUN, Jian-hua LI, Shu-tang YANG, Gong-liang CHEN. Non-interactive identity-based threshold signature scheme without random oracles. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(6): 727-736.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.A0720028     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2008/V9/I6/727

[1] Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG. Certificateless key-insulated signature without random oracles[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(12): 1790-1800.
[2] Jin-hua JIANG, Ke CHEN, Xiao-yan LI, Gang CHEN, Li-dan SHOU. Efficient processing of ordered XML twig pattern matching based on extended Dewey[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(12): 1769-1783.
[3] Ying XU, Chang-fu ZONG, Hsiao-hsiang NA, Lei LIU. Investigations on control algorithm of steady-state cornering and control strategy for dynamical correction in a steer-by-wire system[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(6): 900-908.
[4] Peng HUANG, Jie ZHU. Predicting the fault-proneness of class hierarchy in object-oriented software using a layered kernel[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(10): 1390-1397.
[5] Qiong WEI, Yan-sheng LU, Lei ZOU. ε-inclusion: privacy preserving re-publication of dynamic datasets[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(8): 1124-1133.
[6] Jian HE, Hui LI, Yong ZHANG, Zhang-qin HUANG. Bluetooth-based authentication system for ambient intelligence[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(6): 770-775.
[7] Yi-jun BEI, Gang CHEN, Jin-xiang DONG, Ke CHEN. Bottom-up mining of XML query patterns to improve XML querying[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(6): 744-757.
[8] FAROOQ M., WANG Dao-bo. Implementation of a new PC based controller for a PUMA robot[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(12): 1962-1970.
[9] LIANG Jun-jie, FENG Yu-cai. Indexing the bit-code and distance for fast KNN search in high-dimensional spaces[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(6): 857-863.
[10] HUANG Chuan-dong, JIANG Fan. Timing issues in distributed testing[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(4): 522-528.
[11] PAN Peng, LU Yan-sheng. Monitoring nearest neighbor queries with cache strategies[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(4): 529-537.
[12] HU Tian-lei, CHEN Gang, LI Xiao-yan, DONG Jin-xiang. Automatic relational database compression scheme design based on swarm evolution[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(10): 4-.
[13] LIANG Hai-hua, ZHU Miao-liang. Applying the model driven generative domain engineering method to develop self-organizing architectural solutions for mobile robot[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(10): 5-.
[14] HU Hua, ZHANG Yang. A framework for Internet service evolution based on active object[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(10): 6-.
[15] WANG Mei-yuan, LU Yao-bin, ZHANG Jin-long. Software outsourcing risk management: establishing outsourcee evaluation item systems[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(6): 1092-1098.