[[abstract]]In 2005, Qian et al. proposed a pairingbased threshold proxy signature scheme with non-repudiation property. However, this paper points out that their scheme is not secure against both the original signer forgery attack and the universal forgery attack. Furthermore, an improved scheme is proposed to avoid the weaknesses on Qian et al.’s scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public ke...
In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well a...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
[[abstract]]In 2000, Hwang et al. proposed a nonrepudiable threshold proxy signature scheme to impro...
[[abstract]]In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature ...
proposed a novel efficient threshold proxy signature scheme based on Schnorr's scheme. In their...
Abstract. Sun’s nonrepudiation threshold proxy signature scheme is not secure against the collu-sion...
A (t, n) threshold proxy signature scheme allows t or more proxy signers out of a designated group o...
[[abstract]]In 2000, Hwang et al. proposed a nonrepudiable threshold proxy signature scheme to impro...
Abstract. In the (t; n) proxy signature scheme, the signature, originally signed by a signer, can be...
[[abstract]]In the (t,n) proxy signature scheme, the signature signed by the original signer can be ...
[[abstract]]Sun's nonrepudiation threshold proxy signature scheme is not secure against the collusio...
A threshold proxy signature scheme allows any or more proxy signers to cooperatively sign messages o...
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public ke...
In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well a...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
[[abstract]]In 2000, Hwang et al. proposed a nonrepudiable threshold proxy signature scheme to impro...
[[abstract]]In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature ...
proposed a novel efficient threshold proxy signature scheme based on Schnorr's scheme. In their...
Abstract. Sun’s nonrepudiation threshold proxy signature scheme is not secure against the collu-sion...
A (t, n) threshold proxy signature scheme allows t or more proxy signers out of a designated group o...
[[abstract]]In 2000, Hwang et al. proposed a nonrepudiable threshold proxy signature scheme to impro...
Abstract. In the (t; n) proxy signature scheme, the signature, originally signed by a signer, can be...
[[abstract]]In the (t,n) proxy signature scheme, the signature signed by the original signer can be ...
[[abstract]]Sun's nonrepudiation threshold proxy signature scheme is not secure against the collusio...
A threshold proxy signature scheme allows any or more proxy signers to cooperatively sign messages o...
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public ke...
In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well a...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...