[[abstract]]Proxy signature allows one user to delegate his signing capacity to other people. No proxy signature scheme based on the widespread RSA cryptosystem was proposed until 2003. However, the first RSA-based (t, n) threshold proxy signature scheme suffers from some drawbacks: (1) the original signer?s private key can be derived and (2) the delegates? identities need to be chosen carefully. In this paper, we will propose an improved RSA-based (t, n) threshold proxy signature scheme with free-will identities and without the help of the trusted combiner. Moreover, the proposed scheme ensures the proxy signers? partial anonymity to provide the real proxy signers? privacy for safety, and no proxy signing key will be retrieved by the coope...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
[[abstract]]A (t,n) threshold proxy signature scheme allows t or more proxy signers from a designate...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
[[abstract]]Hwang, Lu and Lin (2003) proposed a (t, n) threshold proxy signature scheme, based on th...
A (t, n) threshold proxy signature scheme allows t or more proxy signers out of a designated group o...
[[abstract]]In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature ...
In a (t, n) proxy signature scheme, the original signer can delegate his/her signing capability to ...
[[abstract]]In this article, we shall propose a ((t1, n1), (t2, n2)) proxy signature scheme with (t3...
[[abstract]]In this article, we shall propose a ((t1, n1), (t2, n2)) proxy signature scheme with (t3...
[[abstract]]All previously proposed threshold proxy signature schemes have been based on discrete lo...
[[abstract]]In the (t,n) proxy signature scheme, the signature signed by the original signer can be ...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
Abstract. A proxy signature allows a designated person, called a proxy signer, to sign the message o...
Abstract. Delegation of rights is a common practice in the real world. We present two identity-based...
Abstract. In the (t; n) proxy signature scheme, the signature, originally signed by a signer, can be...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
[[abstract]]A (t,n) threshold proxy signature scheme allows t or more proxy signers from a designate...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
[[abstract]]Hwang, Lu and Lin (2003) proposed a (t, n) threshold proxy signature scheme, based on th...
A (t, n) threshold proxy signature scheme allows t or more proxy signers out of a designated group o...
[[abstract]]In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature ...
In a (t, n) proxy signature scheme, the original signer can delegate his/her signing capability to ...
[[abstract]]In this article, we shall propose a ((t1, n1), (t2, n2)) proxy signature scheme with (t3...
[[abstract]]In this article, we shall propose a ((t1, n1), (t2, n2)) proxy signature scheme with (t3...
[[abstract]]All previously proposed threshold proxy signature schemes have been based on discrete lo...
[[abstract]]In the (t,n) proxy signature scheme, the signature signed by the original signer can be ...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
Abstract. A proxy signature allows a designated person, called a proxy signer, to sign the message o...
Abstract. Delegation of rights is a common practice in the real world. We present two identity-based...
Abstract. In the (t; n) proxy signature scheme, the signature, originally signed by a signer, can be...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
[[abstract]]A (t,n) threshold proxy signature scheme allows t or more proxy signers from a designate...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...