New nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
On the security enhancement of an efficient and secure event signature protocol for p2p MMOGs
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part I
Hi-index | 0.00 |
In the (t, n) proxy signature scheme, the signature, signed by a signer originally, can be signed by t or more proxy signers out of a proxy group of n proxy signers. In this paper, we propose a new secure non-repudiable threshold proxy signature scheme with valid delegation period. In the scheme, the actual signers from the proxy group are known and can be identified. Furthermore, the proposed scheme is efficient in terms of computational complexity.