Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
New nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
An ElGamal-Like Cryptosystem for Enciphering Large Messages
IEEE Transactions on Knowledge and Data Engineering
A new key authentication scheme based on discrete logarithms
Applied Mathematics and Computation
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'
IEEE Transactions on Knowledge and Data Engineering
Visual secret sharing for multiple secrets
Pattern Recognition
A new nonrepudiable threshold proxy signature scheme with valid delegation period
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
A threshold proxy signature scheme using self-certified public keys
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Hi-index | 0.00 |
In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers. In their scheme, the proxy group cannot deny having signed the proxy signature if they did. However, Hsu et al.'s scheme is vulnerable to some attacks. A malicious original signer or malicious proxy signer can impersonate some other proxy signers to generate proxy signatures. In this article, we shall present our cryptanalysis of the Hsu et al.'s scheme. After that, we shall propose a new threshold proxy signature that can overcome the weaknesses.