Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
New nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Threshold Proxy Signature Schemes
ISW '97 Proceedings of the First International Workshop on Information Security
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
An efficient and practical (t, n) threshold proxy signature scheme with known signers
Fundamenta Informaticae
Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'
IEEE Transactions on Knowledge and Data Engineering
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
An RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted Combiner
ISC '08 Proceedings of the 11th international conference on Information Security
Efficient threshold proxy signature protocol for mobile agents
Information Sciences: an International Journal
Hi-index | 0.00 |
Hwang, Lu and Lin (2003) proposed a (t, n) threshold proxy signature scheme, based on the RSA cryptosystem. Later, Wang et al. (2004a) indicated that this scheme was insecure because the original signer's private key could be derived. Moreover, the delegates' identities had to be chosen carefully. In this paper, we propose an improved RSA-based (t, n) threshold proxy signature scheme, which withstands this security flaw and also offers the convenience of choosing identities at will.