Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Threshold Proxy Signature Schemes
ISW '97 Proceedings of the First International Workshop on Information Security
Threshold signature scheme using self-certified public keys
Journal of Systems and Software
An Identity-Based Signature and Its Threshold Version
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
Identity Based Threshold Proxy Signcryption Scheme
CIT '05 Proceedings of the The Fifth International Conference on Computer and Information Technology
Security proofs for signature schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
In 2004, Shao pointed out that both Sun et al.'s and Hsu et al.'s threshold proxy signature schemes are vulnerable to coalition attack. For enhancing the security, Shao proposed an improved scheme with anonymity to outsiders. This signature scheme is meaningless to any outsider because there is no way for him to prove each individual proxy signing public key validity. We further propose a practical threshold proxy signature scheme to remedy this drawback. The new scheme has the following advantages: (l) Any verifier can check whether the authors of the proxy signature belong to the designated proxy group by the original signer, while outsiders cannot find the actual signers; (2) The original signer can identify the actual proxy signers; (3) The verification of the proxy signing public keys of the proxy signers and the threshold proxy signature can be accomplished within a signature verification procedure simultaneously.