Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers
ISNN 2009 Proceedings of the 6th International Symposium on Neural Networks: Advances in Neural Networks - Part II
Breaking Pomykala-Barabasz Threshold Proxy Signature Scheme
Fundamenta Informaticae
A threshold proxy signature scheme using self-certified public keys
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
Hi-index | 0.00 |
Sun's nonrepudiation threshold proxy signature scheme is not secure against the collusion attack. In order to guard against the attack, Hwang et al. proposed another threshold proxy signature scheme. However, a new attack is proposed to work on both Hwang et al.'s and Sun's schemes. By executing this attack, one proxy signer and the original signer can forge any valid proxy signature. Therefore, both Hwang et al.'s scheme and Sun's scheme were insecure.