CRYPTO '89 Proceedings on Advances in cryptology
Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Communications of the ACM
New nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
A Digital Nominative Proxy Signature Scheme for Mobile Communication
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'
IEEE Transactions on Knowledge and Data Engineering
A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Future Generation Computer Systems - Special issue: Computational chemistry and molecular dynamics
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
A practical scheme for non-interactive verifiable secret sharing
SFCS '87 Proceedings of the 28th Annual Symposium on Foundations of Computer Science
Distributed provers with applications to undeniable signatures
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
A threshold cryptosystem without a trusted party
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
Breaking Pomykala-Barabasz Threshold Proxy Signature Scheme
Fundamenta Informaticae
Security weaknesses in two proxy signature schemes
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Hi-index | 0.00 |
A (t,n) threshold proxy signature scheme enables an original signer or a group of original signers to delegate the signature authority to a proxy group of n members such that not less than t proxy signers can cooperatively sign messages on behalf of the original signer or the original signer group. In the paper, we show that Sun's and Yang et al.'s threshold proxy signature schemes are insecure against the original signer's forgery, and that Tzeng et al.'s threshold multi-proxy multi-signature scheme is vulnerable against the actual original signer group's forgery. We also show that Hsu et al.'s threshold proxy signature scheme suffers from the conspiracy of the original signer and the secret share dealer SA, and that Hwang et al.'s threshold proxy signature scheme is universally forgeable. In other words, none of the above-mentioned schemes holds the unforgeability and provides non-repudiation.