Abstract. Sun’s nonrepudiation threshold proxy signature scheme is not secure against the collu-sion attack. In order to guard against the attack, Hwang et al. proposed another threshold proxy signature scheme. However, a new attack is proposed to work on both Hwang et al.’s and Sun’s schemes. By executing this attack, one proxy signer and the original signer can forge any valid proxy signature. Therefore, both Hwang et al.’s scheme and Sun’s scheme were insecure. Key words: digital signature, proxy signature, threshold proxy signature. 1
[[abstract]]A (t,n) threshold proxy signature scheme allows t or more proxy signers from a designate...
In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well a...
AbstractTzeng et al. proposed a threshold multi-proxy multi-signature scheme with threshold verifica...
[[abstract]]Sun's nonrepudiation threshold proxy signature scheme is not secure against the collusio...
[[abstract]]In 2000, Hwang et al. proposed a nonrepudiable threshold proxy signature scheme to impro...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
[[abstract]]In 2000, Hwang et al. proposed a nonrepudiable threshold proxy signature scheme to impro...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
In 1999, Sun et al. proposed a new (t, n) threshold proxy signature scheme based on Zhang's thr...
proposed a novel efficient threshold proxy signature scheme based on Schnorr's scheme. In their...
[[abstract]]In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature ...
Abstract. In the (t; n) proxy signature scheme, the signature, originally signed by a signer, can be...
A (t, n) threshold proxy signature scheme allows t or more proxy signers out of a designated group o...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
[[abstract]]In 2005, Qian et al. proposed a pairingbased threshold proxy signature scheme with non-r...
[[abstract]]A (t,n) threshold proxy signature scheme allows t or more proxy signers from a designate...
In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well a...
AbstractTzeng et al. proposed a threshold multi-proxy multi-signature scheme with threshold verifica...
[[abstract]]Sun's nonrepudiation threshold proxy signature scheme is not secure against the collusio...
[[abstract]]In 2000, Hwang et al. proposed a nonrepudiable threshold proxy signature scheme to impro...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
[[abstract]]In 2000, Hwang et al. proposed a nonrepudiable threshold proxy signature scheme to impro...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
In 1999, Sun et al. proposed a new (t, n) threshold proxy signature scheme based on Zhang's thr...
proposed a novel efficient threshold proxy signature scheme based on Schnorr's scheme. In their...
[[abstract]]In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature ...
Abstract. In the (t; n) proxy signature scheme, the signature, originally signed by a signer, can be...
A (t, n) threshold proxy signature scheme allows t or more proxy signers out of a designated group o...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
[[abstract]]In 2005, Qian et al. proposed a pairingbased threshold proxy signature scheme with non-r...
[[abstract]]A (t,n) threshold proxy signature scheme allows t or more proxy signers from a designate...
In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well a...
AbstractTzeng et al. proposed a threshold multi-proxy multi-signature scheme with threshold verifica...