Cryptology ePrint Archive: Report 2006/308

Efficient ID-based Threshold Signature Schemes without Pairings

Jun Shao and Zhenfu Cao and Licheng Wang

Abstract: The focus of this paper is to design an efficient and secure solution addressing the key escrow problem in ID-based signature schemes, i.e., the Private Key Generator (PKG) knows the user's private key, which damages the essential requirement--``non-repudiation" property of signature schemes. In this paper, we proposed two ID-based threshold signature schemes, which both reach Girault's trusted level 3, and in which there exists only one PKG in our ID-based threshold signature schemes. In particular, the second scheme has another good property: it does not require trusting any particular party at any time.

Compared with the previous schemes, our schemes do not need to compute pairings, which make them be more efficient than those schemes. Furthermore, our ID-based signature schemes increase the availability of the signing agency and the difficulty for the adversary to learn the private key.

Category / Keywords: public-key cryptography / ID-based signature, threshold signature, the Schnorr's signature

Date: received 5 Sep 2006

Contact author: chn junshao at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20060906:193304 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]