
tion is required like p2p networks, ad hoc networks or
MANETs thus offering a strong security backbone to
those applications and simplifying their security func-
tionality with small compromises (mostly in perfor-
mance). Our future goal is to expand the proposed
solution so as to include better malicious participant
discovery and provide formalization of the system’s
security characterization.
REFERENCES
Boneh, D., Boyen, X., and Halevi, S. (2006). Chosen ci-
phertext secure public key threshold encryption with-
out random oracles. In Pointcheval, D., editor, CT-
RSA, volume 3860 of Lecture Notes in Computer Sci-
ence, pages 226–243. Springer.
Boneh, D. and Franklin, M. K. (2001). Identity-based en-
cryption from the weil pairing. In Proceedings of the
21st Annual International Cryptology Conference on
Advances in Cryptology, CRYPTO ’01, pages 213–
229, London, UK. Springer-Verlag.
Boyen, X. (2008). A tapestry of identity-based encryption
: practical frameworks compared. International Jour-
nal of Applied Cryptography, 1(1):3–21.
Damgard, I. and Koprowski, M. (2000). Practical threshold
rsa signatures without a trusted dealer. pages 152–165.
Springer Verlag.
Desmedt, Y. and Frankel, Y. (1989). Threshold cryptosys-
tems. In Brassard, G., editor, CRYPTO, volume 435 of
Lecture Notes in Computer Science, pages 307–315.
Springer.
Fournaris, A. P. (2011). Distributed threshold cryptography
certification with no trusted dealer. In Lopez, J. and
Samarati, P., editors, SECRYPT 2011, pages 400–404.
SciTePress.
Frankel, Y., Gemmell, P., MacKenzie, P. D., and Yung, M.
(1997). Optimal resilience proactive public-key cryp-
tosystems. In FOCS, pages 384–393. IEEE Computer
Society.
Fujisaki, E. and Okamoto, T. (1999). Secure integration
of asymmetric and symmetric encryption schemes. In
Proceedings of the 19th Annual International Cryptol-
ogy Conference on Advances in Cryptology, CRYPTO
’99, pages 537–554, London, UK. Springer-Verlag.
Galindo, D., Morillo, P., and Rfols, C. (2008). Improved
certificate-based encryption in the standard model.
Journal of Systems and Software, 81(7):1218 – 1226.
Gennaro, R., Jarecki, S., Krawczyk, H., and Rabin, T.
(2001). Robust threshold dss signatures. Inf. Com-
put., 164(1):54–84.
Gennaro, R., Jarecki, S., Krawczyk, H., and Rabin, T.
(2007). Secure distributed key generation for discrete-
log based cryptosystems. Journal of Cryptology,
20:51–83. 10.1007/s00145-006-0347-3.
Gentry, C. (2003). Certificate-based encryption and the
certificate revocation problem. In Biham, E., editor,
Advances in Cryptology EUROCRYPT 2003, volume
2656 of Lecture Notes in Computer Science, pages
641–641. Springer Berlin / Heidelberg.
Herzberg, A., Jarecki, S., Krawczyk, H., and Yung, M.
(1995). Proactive secret sharing or: How to cope with
perpetual leakage. In Proceedings of the 15th Annual
International Cryptology Conference on Advances in
Cryptology, CRYPTO ’95, pages 339–352, London,
UK. Springer-Verlag.
Libert, B. and Quisquater, J.-J. (2003). Efficient revocation
and threshold pairing based cryptosystems. In Pro-
ceedings of the twenty-second annual symposium on
Principles of distributed computing, PODC ’03, pages
163–171, New York, NY, USA. ACM.
Lu, Y. (2011). An efficient and provably secure certificate-
based encryption scheme. In Zhou, Q., editor, The-
oretical and Mathematical Foundations of Computer
Science, volume 164 of Communications in Com-
puter and Information Science, pages 54–61. Springer
Berlin Heidelberg.
Lu, Y. and Li, J. (2009). Forward-secure certificate-based
encryption. In Proceedings of the 2009 Fifth Interna-
tional Conference on Information Assurance and Se-
curity - Volume 02, IAS ’09, pages 57–60, Washing-
ton, DC, USA. IEEE Computer Society.
Lu, Y., Li, J., and Xiao, J. (2009). Threshold Certificate-
Based Encryption: Definition and Concrete Construc-
tion. In 2009 International Conference on Networks
Security, Wireless Communications and Trusted Com-
puting, pages 278–282. IEEE.
Noack, A. and Spitz, S. (2008). Dynamic threshold cryp-
tosystem without group manager. Cryptology ePrint
Archive, Report 2008/380. http://eprint.iacr.org/.
Park, C. and Kurosawa, K. (1996). New ElGamal Type
Threshold Digital Signature Scheme. IEICE Trans-
actions on Fundamentals of Electronics, Communica-
tions and Computer Sciences, E79-A(1):86–93.
Pedersen, T. P. (1991). A threshold cryptosystem without
a trusted party. In Proceedings of the 10th annual
international conference on Theory and application
of cryptographic techniques, EUROCRYPT’91, pages
522–526, Berlin, Heidelberg. Springer-Verlag.
Shamir, A. (1979). How to share a secret. Commun. ACM,
22:612–613.
Shao, Z. (2011). Enhanced certificate-based encryption
from pairings. Comput. Electr. Eng., 37:136–146.
Shoup, V. (2000). Practical threshold signatures. In Pro-
ceedings of the 19th international conference on The-
ory and application of cryptographic techniques, EU-
ROCRYPT’00, pages 207–220, Berlin, Heidelberg.
Springer-Verlag.
Wang, G. (2003). On the security of the li-hwang-lee-
tsai threshold group signature scheme. In Lee, P. and
Lim, C., editors, Information Security and Cryptology
ICISC 2002, volume 2587 of Lecture Notes in Com-
puter Science, pages 75–89. Springer Berlin / Heidel-
berg. 10.1007/3-540-36552-4-6.
SECRYPT2012-InternationalConferenceonSecurityandCryptography
320