An RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted Combiner
ISC '08 Proceedings of the 11th international conference on Information Security
Provably secure proxy-protected signature schemes based on RSA
Computers and Electrical Engineering
Efficient threshold proxy signature protocol for mobile agents
Information Sciences: an International Journal
An efficient ID-Based delegation network
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Hi-index | 0.00 |
Recently, a threshold proxy signature scheme based on RSA cryptosystem to enhance the flexibility of traditional proxy signature scheme has been proposed by Hwang et al. However, this new threshold proxy signature scheme is still unworkable because there is some security weakness, such as the similar to RSA reblocking problem and each proxy signer can not find out the Lagrange coefficient, exist in this new scheme. In this paper, we not only give some security flaws to show that their scheme is insecure but also provide a feasible scheme to solve the open problem.