Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Society and Group Oriented Cryptography: A New Concept
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Threshold Proxy Signature Schemes
ISW '97 Proceedings of the First International Workshop on Information Security
Improvement of Multi-Proxy Signature Scheme
CIT '04 Proceedings of the The Fourth International Conference on Computer and Information Technology
A novel efficient (t,n) threshold proxy signature scheme
Information Sciences: an International Journal
Hi-index | 0.00 |
Digital signature scheme allows a user to sign a message in such a way that anyone can verify the signature, but no one can forge the signature on any other message. In this paper, we show that Xie and Yu’s threshold signature scheme, Huang and Chang’s threshold proxy signature scheme, Qian, Cao and Xue’s pairing-based threshold proxy signature scheme, Xue and Cao’s multi-proxy signature scheme and Zhou et al.’s proxy multi-signature scheme are all insecure against the forgery attacks.