Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
On Zhang's Nonrepudiable Proxy Signature Schemes
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Future Generation Computer Systems - Special issue: Computational chemistry and molecular dynamics
A fair protocol for signing contracts
IEEE Transactions on Information Theory
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
Information Sciences: an International Journal
How to construct secure proxy cryptosystem
Information Sciences: an International Journal
Threshold cryptography based on Asmuth-Bloom secret sharing
Information Sciences: an International Journal
Certificateless threshold cryptosystem secure against chosen-ciphertext attack
Information Sciences: an International Journal
Hybrid proxy multisignature: A new type multi-party signature
Information Sciences: an International Journal
All-in-one group-oriented cryptosystem based on bilinear pairing
Information Sciences: an International Journal
Convertible multi-authenticated encryption scheme
Information Sciences: an International Journal
New (t,n) threshold directed signature scheme with provable security
Information Sciences: an International Journal
New efficient and practical verifiable multi-secret sharing schemes
Information Sciences: an International Journal
Security Analysis of the Pomykala-Barabasz Scheme
Fundamenta Informaticae
A secure identity-based proxy multi-signature scheme
Information Sciences: an International Journal
A secure identity-based multi-proxy signature scheme
Computers and Electrical Engineering
Practical Threshold Signatures with Linear Secret Sharing Schemes
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Efficient threshold proxy signature protocol for mobile agents
Information Sciences: an International Journal
A threshold proxy signature scheme from bilinear pairings
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A generic construction for proxy signature scheme
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II
Efficient certificateless proxy signature scheme with provable security
Information Sciences: an International Journal
Security analysis of some threshold signature schemes and multi-signature schemes
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Verifiable multi-secret sharing based on LFSR sequences
Theoretical Computer Science
Security Analysis of the Pomykala-Barabasz Scheme
Fundamenta Informaticae
A new proxy signature scheme for a specified group of verifiers
Information Sciences: an International Journal
A novel anonymous proxy signature scheme
Advances in Multimedia
International Journal of Security and Networks
Hi-index | 0.07 |
All previously proposed threshold proxy signature schemes have been based on discrete logarithms required for a protocol to generate and verify a shared secret among the proxy group. Therefore, it is necessary for the proxy signers to perform many expensive modular exponential computations and communications to obtain and verify a shared secret. Moreover, most of the existing threshold proxy signature schemes reveal that the receiver cannot find out who signed the proxy signatures. We propose an efficient (t,n) threshold proxy signature scheme based on Schnorr's scheme. Compared with existing (t,n) threshold proxy signature schemes, our scheme can reduce the amount of computations and communications. In our method, not only the original signer can know who generated the proxy signature, but also the receiver can certify the actuality of the group signers who made the proxy signature. We offer convenience and fair distribution of auditing a document's signers.