A practical protocol for large group oriented networks
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
CRYPTO '89 Proceedings on Advances in cryptology
Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Cryptography and data security
Cryptography and data security
MAgNET: Mobile Agents for Networked Electronic Trading
IEEE Transactions on Knowledge and Data Engineering
Mobile Agents for World Wide Web Distributed Database Access
IEEE Transactions on Knowledge and Data Engineering
An ElGamal-Like Cryptosystem for Enciphering Large Messages
IEEE Transactions on Knowledge and Data Engineering
On Zhang's Nonrepudiable Proxy Signature Schemes
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Efficient Generation of Shared RSA Keys (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Threshold Proxy Signature Schemes
ISW '97 Proceedings of the First International Workshop on Information Security
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
An efficient and practical (t, n) threshold proxy signature scheme with known signers
Fundamenta Informaticae
Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'
IEEE Transactions on Knowledge and Data Engineering
Factoring based proxy signature schemes
Journal of Computational and Applied Mathematics - Special issue: The international symposium on computing and information (ISCI2004)
MoRVAM: A reverse Vickrey auction system for mobile commerce
Expert Systems with Applications: An International Journal
Improvement of Yang et al.'s threshold proxy signature scheme
Journal of Systems and Software
Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
An RSA-based (t, n) threshold proxy signature scheme with freewill identities
International Journal of Information and Computer Security
Security Analysis of the Pomykala-Barabasz Scheme
Fundamenta Informaticae
Methods for image authentication: a survey
Multimedia Tools and Applications
An RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted Combiner
ISC '08 Proceedings of the 11th international conference on Information Security
Cryptanalysis and improvement of a threshold proxy signature scheme
Computer Standards & Interfaces
Efficient threshold proxy signature protocol for mobile agents
Information Sciences: an International Journal
A new nonrepudiable threshold proxy signature scheme with valid delegation period
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Breaking Pomykala-Barabasz Threshold Proxy Signature Scheme
Fundamenta Informaticae
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
Securing admission control in ubiquitous computing environment
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
An efficient ID-Based delegation network
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
On the security of some nonrepudiable threshold proxy signature schemes
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Security Analysis of the Pomykala-Barabasz Scheme
Fundamenta Informaticae
Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
Information Processing Letters
Hi-index | 0.00 |
In a (t,n) threshold proxy signature scheme, the original signer delegates the power of signing messages to a designated proxy group of n members. Any t or more proxy signers of the group can cooperatively issue a proxy signature on behalf of the original signer, but (t-1) or less proxy signers cannot. Previously, all of the proposed threshold proxy signature schemes have been based on the discrete logarithm problem and do not satisfy all proxy requirements. In this paper, we propose a practical, efficient, and secure (t,n) threshold proxy signature scheme based on the RSA cryptosystem. Our scheme satisfies all proxy requirements and uses only a simple Lagrange formula to share the proxy signature key. Furthermore, our scheme requires only 5 percent of the computational overhead and 8 percent of the communicational overhead required in Kim's scheme.