New nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'
IEEE Transactions on Knowledge and Data Engineering
A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
ICITA '05 Proceedings of the Third International Conference on Information Technology and Applications (ICITA'05) Volume 2 - Volume 02
New (t,n) threshold directed signature scheme with provable security
Information Sciences: an International Journal
An RSA-based (t, n) threshold proxy signature scheme with freewill identities
International Journal of Information and Computer Security
Efficient generic on-line/off-line (threshold) signatures without key exposure
Information Sciences: an International Journal
A secure identity-based proxy multi-signature scheme
Information Sciences: an International Journal
A novel efficient (t,n) threshold proxy signature scheme
Information Sciences: an International Journal
An ideal multi-secret sharing scheme based on MSP
Information Sciences: an International Journal
Efficient autonomous signature exchange on ubiquitous networks
Journal of Network and Computer Applications
A Secure Integrated Medical Information System
Journal of Medical Systems
A new proxy signature scheme for a specified group of verifiers
Information Sciences: an International Journal
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
Information Processing Letters
Hi-index | 0.07 |
Mobile agents can migrate across different execution environments through the network. One important task of a mobile agent is to act as a proxy signer to sign a digital signature on behalf of the agent owner. As the agent and the remote hosts are not trustworthy, or are probably malicious, there are great challenges for the task. In this paper, we propose an efficient, secure (t,n) threshold proxy signature scheme based on the RSA cryptosystem. The proposed scheme shares the proxy signing key with a simple Lagrange formula. However, it does not reveal any secret information. Owing to its simple algorithm and few parameter requirements, the proposed scheme requires few calculations and few transactions. The proxy signature generation stage and the proxy signature combining stage are completely non-interactive. Furthermore, the size of the partial proxy signing key and that of the partial proxy signature are constant and independent of the number of proxy signers.