Abstract: Proxy blind signature is a cryptographic research hotspot, and has been applied in many occasions. Many proxy blind signature schemes were proposed, however, all the schemes rely on secure channels to transmit proxy secret key. Therefore, Lu, Cao and Zhou proposed a new proxy blind multi-signature scheme recently, which does not need a secure channel and is provably secure under the random oracle model. In this letter, however, we show that their scheme is not secure against the original signer’s forgery attack. Moreover, we give four improved proxy key generation algorithms to counter this attack
Digital proxy multi-signature and blind signature scheme are found very useful for the purpose of el...
[[abstract]]In 2000, Hwang et al. proposed a nonrepudiable threshold proxy signature scheme to impro...
In a designated verifier proxy signature scheme, there are three participants, namely, the original ...
Proxy signature allows an original signer to delegate his/her signing capability to a proxy signer s...
Proxy blind signature is an important cryptographic primitive and plays an essential role in constru...
Cao-Cao’s recently proposed an identity-based proxy signature scheme and claim that the scheme is pr...
[[abstract]]In 2000, Hwang et al. proposed a nonrepudiable threshold proxy signature scheme to impro...
A proxy blind signature scheme is combination of two signature schemes particularly proxy signature ...
Abstract: Proxy signature allows an original signer to delegate his/her signing capability to a prox...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
Abstract. Cao-Cao’s recently proposed an identity-based proxy signature scheme and claim that the sc...
[[abstract]]The proxy blind signature scheme (PBSS), allows the authorized proxy signer to use his p...
Abstract. Sun’s nonrepudiation threshold proxy signature scheme is not secure against the collu-sion...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
Digital proxy multi-signature and blind signature scheme are found very useful for the purpose of el...
Digital proxy multi-signature and blind signature scheme are found very useful for the purpose of el...
[[abstract]]In 2000, Hwang et al. proposed a nonrepudiable threshold proxy signature scheme to impro...
In a designated verifier proxy signature scheme, there are three participants, namely, the original ...
Proxy signature allows an original signer to delegate his/her signing capability to a proxy signer s...
Proxy blind signature is an important cryptographic primitive and plays an essential role in constru...
Cao-Cao’s recently proposed an identity-based proxy signature scheme and claim that the scheme is pr...
[[abstract]]In 2000, Hwang et al. proposed a nonrepudiable threshold proxy signature scheme to impro...
A proxy blind signature scheme is combination of two signature schemes particularly proxy signature ...
Abstract: Proxy signature allows an original signer to delegate his/her signing capability to a prox...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
Abstract. Cao-Cao’s recently proposed an identity-based proxy signature scheme and claim that the sc...
[[abstract]]The proxy blind signature scheme (PBSS), allows the authorized proxy signer to use his p...
Abstract. Sun’s nonrepudiation threshold proxy signature scheme is not secure against the collu-sion...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
Digital proxy multi-signature and blind signature scheme are found very useful for the purpose of el...
Digital proxy multi-signature and blind signature scheme are found very useful for the purpose of el...
[[abstract]]In 2000, Hwang et al. proposed a nonrepudiable threshold proxy signature scheme to impro...
In a designated verifier proxy signature scheme, there are three participants, namely, the original ...