Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Threshold Proxy Signature Schemes
ISW '97 Proceedings of the First International Workshop on Information Security
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
Security analysis and improvement of some proxy signature schemes
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Factoring based proxy signature schemes
Journal of Computational and Applied Mathematics - Special issue: The international symposium on computing and information (ISCI2004)
An efficient short certificate-based signature scheme
Journal of Systems and Software
A threshold proxy signature scheme using self-certified public keys
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Hi-index | 0.00 |
The concept of proxy signature introduced by Mambo, Usuda, and Okamoto allows a designated person, called a proxy signer, to sign on behalf of an original signer. However, most existing proxy signature schemes do not support nonrepudiation. In this paper, two secure nonrepudiable proxy multi-signature schemes are proposed that overcome disadvantages of the existing schemes. The proposed schemes can withstand public key substitution attack. In addition, the new schemes have some other advantages such as proxy signature key generation and updating using insecure channels. This approach can also be applied to other ElGamal-like proxy signature schemes.