Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Communications of the ACM
New nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
On Zhang's Nonrepudiable Proxy Signature Schemes
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
Hi-index | 0.00 |
In 2000, Hwang et al. made an improvement on Sun's threshold proxy signature scheme. In 2004, Tzeng et al. present that Hwang et al.'s scheme is vulnerable against attack. A malicious original signer can forge the threshold proxy signatures without the agreement of the proxy signers. Tzeng et al. also constructed a nonrepudiable threshold proxy signature scheme with known signers and claimed the proposed scheme improved the security of Hwang et al.'s scheme. In this paper, we pointed that reasoning in THY-scheme exist severity error. Since it is repaired hardly possible that this reasoning in secret share generation phase of THY-scheme existed error, therefore THY-scheme is not useful even though changed some formulae.