A course in number theory and cryptography
A course in number theory and cryptography
Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
New nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Threshold Proxy Signature Schemes
ISW '97 Proceedings of the First International Workshop on Information Security
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Breaking and repairing optimistic fair exchange from PODC 2003
Proceedings of the 3rd ACM workshop on Digital rights management
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
Practical threshold signatures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
An analysis of proxy signatures: is a secure channel necessary?
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
Improvement of Yang et al.'s threshold proxy signature scheme
Journal of Systems and Software
An RSA-based (t, n) threshold proxy signature scheme with freewill identities
International Journal of Information and Computer Security
An RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted Combiner
ISC '08 Proceedings of the 11th international conference on Information Security
Provably secure proxy-protected signature schemes based on RSA
Computers and Electrical Engineering
Efficient threshold proxy signature protocol for mobile agents
Information Sciences: an International Journal
An efficient ID-Based delegation network
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
On the security of some nonrepudiable threshold proxy signature schemes
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
A new proxy signature scheme for a specified group of verifiers
Information Sciences: an International Journal
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
Information Processing Letters
Hi-index | 0.00 |
In a (t,n) threshold proxy signature scheme, the original signer can delegate his/her signing capability to n proxy signers such that any t or more proxy signers can sign messages on behalf of the former, but t-1 or less of them cannot do the same thing. Such schemes have been suggested for use in a number of applications, particularly, in distributed computing where delegation of rights is quite common. Based on the RSA cryptosystem, Hwang et al. [7] recently proposed an efficient (t,n) threshold proxy signature scheme. In this paper, we identify several security weaknesses in their scheme and show that their scheme is insecure.