<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">0868-4952</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<publisher>
				<publisher-name>VU</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">info20401</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2009.260</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="Author">
					<name>
						<surname>Gao</surname>
						<given-names>Wei</given-names>
					</name>
					<email xlink:href="mailto:sdgaowei@gmail.com">sdgaowei@gmail.com</email>
					<email xlink:href="mailto:sdgaowei@yahoo.com.cn">sdgaowei@yahoo.com.cn</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_001"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Wang</surname>
						<given-names>Guilin</given-names>
					</name>
					<email xlink:href="mailto:g.wang@cs.bham.ac.uk">g.wang@cs.bham.ac.uk</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_002"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Wang</surname>
						<given-names>Xueli</given-names>
					</name>
					<email xlink:href="mailto:wangxuyuyan@yahoo.com.cn">wangxuyuyan@yahoo.com.cn</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_003"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Yang</surname>
						<given-names>Zhenguang</given-names>
					</name>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<aff id="j_INFORMATICA_aff_000">School of Mathematics &amp; Information, Ludong University, Yantai 264025, P.R. China</aff>
				<aff id="j_INFORMATICA_aff_001">Guangdong Key Lab of Information Security Technology, Sun Yat-sen University, Guangzhou 510275, P.R. China</aff>
				<aff id="j_INFORMATICA_aff_002">School of Computer Science, University of Birmingham, Birmingham B15 2TT, UK</aff>
				<aff id="j_INFORMATICA_aff_003">School of Mathematics, South China Normal University, Guangzhou 510631, P.R. China, e-mail: maths@ldu.edu.cn</aff>
			</contrib-group>
			<pub-date pub-type="epub">
				<day>01</day>
				<month>01</month>
				<year>2009</year>
			</pub-date>
			<volume>20</volume>
			<issue>4</issue>
			<fpage>461</fpage>
			<lpage>476</lpage>
			<history>
				<date date-type="received">
					<day>01</day>
					<month>12</month>
					<year>2007</year>
				</date>
				<date date-type="accepted">
					<day>01</day>
					<month>06</month>
					<year>2008</year>
				</date>
			</history>
			<abstract>
				<p>In this paper, we propose a new ID-based threshold signature scheme from the bilinear pairings, which is provably secure in the random oracle model under the bilinear Diffie–Hellman assumption. Our scheme adopts the approach that the private key associated with an identity rather than the master key of PKG is shared. Comparing to the-state-of-art work by Baek and Zheng, our scheme has the following advantages. (1) The round-complexity of the threshold signing protocol is optimal. Namely, during the signing procedure, each party broadcasts only one message. (2) The communication channel is optimal. Namely, during the threshold signing procedure, the broadcast channel among signers is enough. No private channel between any two signing parties is needed. (3) Our scheme is much more efficient than the Baek and Zheng scheme in term of computation, since we try our best to avoid using bilinear pairings. Indeed, the private key of an identity is indirectly distributed by sharing a number x<inf>ID</inf>∈ <formula>$\mathbb{Z}^{*}_{q}$</formula>, which is much more efficient than directly sharing the element in the bilinear group. And the major computationally expensive operation called distributed key generation protocol based on the bilinear map is avoided. (4) At last, the proactive security can be easily added to our scheme.</p>
			</abstract>
			<kwd-group>
				<label>Keywords</label>
				<kwd>identity-based signature</kwd>
				<kwd>threshold signature</kwd>
				<kwd>bilinear pairing</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>