A “paradoxical” identity-based signature scheme resulting from zero-knowledge
CRYPTO '88 Proceedings on Advances in cryptology
Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Threshold Proxy Signature Schemes
ISW '97 Proceedings of the First International Workshop on Information Security
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
A proxy-protected signature scheme based on conic
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Factoring based proxy signature schemes
Journal of Computational and Applied Mathematics - Special issue: The international symposium on computing and information (ISCI2004)
Proxy-protected signature secure against the undelegated proxy signature attack
Computers and Electrical Engineering
A privacy problem on Hu-Huang's proxy key generation protocol
Computer Standards & Interfaces
Provably secure proxy-protected signature schemes based on RSA
Computers and Electrical Engineering
Achieving autonomous fair exchange in ubiquitous network settings
Journal of Network and Computer Applications
Factoring-based proxy signature schemes with forward-security
CIS'04 Proceedings of the First international conference on Computational and Information Science
An efficient proxy-protected signature scheme based on factoring
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
A generalized proxy signature scheme based on the RSA cryptosystem
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Efficient autonomous signature exchange on ubiquitous networks
Journal of Network and Computer Applications
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
Information Processing Letters
Hi-index | 0.89 |
The proxy signature schemes allow proxy signers to sign messages on behalf of an original signer, a company or an organization. However, most of existing proxy signature schemes are based on the discrete logarithm problem. In this paper, the author would like to propose two efficient proxy signature schemes based on the factoring problem, which combine the RSA signature scheme and the Guillou-Quisquater signature scheme. One is a proxy-unprotected signature scheme that is more efficient. No matter how many proxy signers cooperatively sign a message, the computation load for verifiers would remain almost constant. The other is a proxy-protected signature scheme that is more secure. Finally, to protect the privacy of proxy signers, the author proposes a proxy-protected signature scheme with anonymous proxy signers.