Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
New nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
An ElGamal-Like Cryptosystem for Enciphering Large Messages
IEEE Transactions on Knowledge and Data Engineering
On Zhang's Nonrepudiable Proxy Signature Schemes
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Threshold Proxy Signature Schemes
ISW '97 Proceedings of the First International Workshop on Information Security
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
Factoring based proxy signature schemes
Journal of Computational and Applied Mathematics - Special issue: The international symposium on computing and information (ISCI2004)
Improvement of Yang et al.'s threshold proxy signature scheme
Journal of Systems and Software
Insider attacks on multi-proxy multi-signature schemes
Computers and Electrical Engineering
Security Analysis of the Pomykala-Barabasz Scheme
Fundamenta Informaticae
Cryptanalysis and improvement of a threshold proxy signature scheme
Computer Standards & Interfaces
A new nonrepudiable threshold proxy signature scheme with valid delegation period
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
On the security of some nonrepudiable threshold proxy signature schemes
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Security Analysis of the Pomykala-Barabasz Scheme
Fundamenta Informaticae
A novel anonymous proxy signature scheme
Advances in Multimedia
Hi-index | 0.00 |
In the (t,n) proxy signature scheme, the signature signed by the original signer can be signed by t or more proxy signers out of a proxy group of n proxy signers. Recently, Hsu et al. proposed a nonrepudiable threshold proxy signature scheme with known signers. In this article, we shall propose an improvement of Hsu et al.'s scheme that is more efficient in terms of computational complexity and communication cost.