|
|
Identity-based Threshold Key-insulated Signature Without Random Oracles
|
CHEN Jianhong1,2,SHAN Jingsong1,YANG Ronggen1,GONG Lejun1,CHEN Kefei 2,YU Kun1,CHEN Liqing1,SUN Chengfu1 |
(1. Faculty of Computer Engineering, Huaiyin Institute of Technology, Huaian 223003, Jiangsu, China; 2. Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, 200240)
|
|
|
Abstract To minimize the damage caused by key-exposure in ID-based signature scenarios, this paper proposed an identity-based threshold key-insulated signature scheme by using Weng et al.’s threshold key-insulated mechanism. The formal proof of security was presented in the standard model, i.e. without random oracles.
|
Received: 17 September 2012
Published: 29 August 2013
|
|
|
|
|
No related articles found! |
|
|
|
|