Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
New nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
An ElGamal-Like Cryptosystem for Enciphering Large Messages
IEEE Transactions on Knowledge and Data Engineering
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
A Modification of the Fiat-Shamir Scheme
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'
IEEE Transactions on Knowledge and Data Engineering
A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Future Generation Computer Systems - Special issue: Computational chemistry and molecular dynamics
Formal analysis of modern security protocols
Information Sciences—Informatics and Computer Science: An International Journal
Factoring based proxy signature schemes
Journal of Computational and Applied Mathematics - Special issue: The international symposium on computing and information (ISCI2004)
A new ring signature scheme with signer-admission property
Information Sciences: an International Journal
Simulatability and security of certificateless threshold signatures
Information Sciences: an International Journal
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences: an International Journal
Improvement of Yang et al.'s threshold proxy signature scheme
Journal of Systems and Software
Insider attacks on multi-proxy multi-signature schemes
Computers and Electrical Engineering
Proxy-protected signature secure against the undelegated proxy signature attack
Computers and Electrical Engineering
One-time proxy signatures revisited
Computer Standards & Interfaces
Identity based proxy multi-signature
Journal of Systems and Software
Security enhancement for digital signature schemes with fault tolerance in RSA
Information Sciences: an International Journal
A provably secure short signature scheme based on discrete logarithms
Information Sciences: an International Journal
Hybrid proxy multisignature: A new type multi-party signature
Information Sciences: an International Journal
Three weaknesses in a simple three-party key exchange protocol
Information Sciences: an International Journal
Identity-based ring signatures from RSA
Theoretical Computer Science
Certificateless Threshold Ring Signature
Information Sciences: an International Journal
Efficient threshold proxy signature protocol for mobile agents
Information Sciences: an International Journal
New threshold-proxy threshold-signature schemes
Computers and Electrical Engineering
A novel efficient (t,n) threshold proxy signature scheme
Information Sciences: an International Journal
The exact security of digital signatures-how to sign with RSA and Rabin
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Time-selective convertible undeniable signatures with short conversion receipts
Information Sciences: an International Journal
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
Hi-index | 0.07 |
In this article, we shall propose a ((t"1, n"1), (t"2, n"2)) proxy signature scheme with (t"3, n"3) shared verification based on the RSA problem. In this scheme, any t"1 original signers can delegate the signing capability to the proxy group. After that, any t"2 proxy signers can sign a message on behalf of the original group for a specified verifier group. Only any t"3 verifiers together can check the validity of the proxy signature from the proxy group. The proposed scheme satisfies all proxy requirements of proxy signatures. Furthermore, the actual original signers and proxy signers can be individually identified in our scheme.