<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">0868-4952</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<publisher>
				<publisher-name>VU</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">info20409</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2009.268</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>Adaptively Secure Threshold Signature Scheme in the Standard Model</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="Author">
					<name>
						<surname>Wang</surname>
						<given-names>Zecheng</given-names>
					</name>
					<email xlink:href="mailto:w52051201006@hotmail.com">w52051201006@hotmail.com</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_001"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Qian</surname>
						<given-names>Haifeng</given-names>
					</name>
					<email xlink:href="mailto:hfqian@cs.ecnu.edu.cn">hfqian@cs.ecnu.edu.cn</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Li</surname>
						<given-names>Zhibin</given-names>
					</name>
					<email xlink:href="mailto:lizb@cs.ecnu.edu.cn">lizb@cs.ecnu.edu.cn</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<aff id="j_INFORMATICA_aff_000">Department of Computer Sci. &amp; Tech., East China Normal University, 200062 Shanghai, China</aff>
				<aff id="j_INFORMATICA_aff_001">Department of Computer Sci. &amp; Tech., Anhui University of Finance and Economics, 233041 Bengbu, China</aff>
			</contrib-group>
			<pub-date pub-type="epub">
				<day>01</day>
				<month>01</month>
				<year>2009</year>
			</pub-date>
			<volume>20</volume>
			<issue>4</issue>
			<fpage>591</fpage>
			<lpage>612</lpage>
			<history>
				<date date-type="received">
					<day>01</day>
					<month>06</month>
					<year>2007</year>
				</date>
				<date date-type="accepted">
					<day>01</day>
					<month>06</month>
					<year>2008</year>
				</date>
			</history>
			<abstract>
				<p>We propose a distributed key generation protocol for pairing-based cryptosystems which is adaptively secure in the erasure-free and secure channel model, and at the same time completely avoids the use of interactive zero-knowledge proofs. Utilizing it as the threshold key generation protocol, we present a secure (t,n) threshold signature scheme based on the Waters' signature scheme. We prove that our scheme is unforgeable and robust against any adaptive adversary who can choose players for corruption at any time during the run of the protocols and make adaptive chosen-message attacks. And the security proof of ours is in the standard model (without random oracles). In addition our scheme achieves optimal resilience, that is, the adversary can corrupt any t&amp;#60;n/2 players.</p>
			</abstract>
			<kwd-group>
				<label>Keywords</label>
				<kwd>threshold signature</kwd>
				<kwd>distributed key generation</kwd>
				<kwd>computational Diffie–Hellman problem</kwd>
				<kwd>adaptively secure</kwd>
				<kwd>provable security</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>