Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Proxy signature schemes based on factoring
Information Processing Letters
On Zhang's Nonrepudiable Proxy Signature Schemes
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Threshold Proxy Signature Schemes
ISW '97 Proceedings of the First International Workshop on Information Security
Nonrepudiable proxy multi-signature scheme
Journal of Computer Science and Technology
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
Provably secure proxy-protected signature schemes based on RSA
Computers and Electrical Engineering
A new proxy signature scheme for a specified group of verifiers
Information Sciences: an International Journal
Hi-index | 0.00 |
In proxy signature schemes, original signers delegate proxy signers to sign messages on behalf of original signers. Currently, most proxy signature schemes are based on the difficulty of discrete logarithms over finite field or ellipse curve addition group. Based on the difficulty of factorings of large integers, one normal proxy signature scheme and one multi-proxy signature scheme are proposed. The security properties of strong unforgeability, verifiability, strong nonrepudiation, strong identifiability, distinguishability and prevention of misuse of proxy signing power can be fulfilled by the proposed schemes. In addition, the performance of the proposed schemes is analysed as well.