[[abstract]]Recently, Zhou et al. declared that they have proposed the first RSA-based proxy-protected signature scheme, as well as the first factoring-based proxy-protected signature scheme. They declared both schemes are capable of meeting the basic security properties: secrecy, verifiability, unforgeability and nonrepudiation. However, we found that both of these schemes actually involve several drawbacks, one of which is the concern on unforgeability. In this paper, we demonstrate how to forge the proxy signature in their schemes and show that their schemes are actually insecure
Abstract. Proxy re-signatures are generally used for the delegation of signing rights of a user (del...
[[abstract]]Hwang, Lu and Lin (2003) proposed a (t, n) threshold proxy signature scheme, based on th...
[[abstract]]In 1996, a new category of signature scheme called a proxy signature was proposed by Mam...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
AbstractIn proxy signature schemes, original signers delegate proxy signers to sign messages on beha...
Proxy signature is a useful cryptographic primitive that has been widely used in many applications. ...
A (t, n) threshold proxy signature scheme allows t or more proxy signers out of a designated group o...
AbstractIn proxy signature schemes, original signers delegate proxy signers to sign messages on beha...
Digital signature scheme is an important research topic in cryptography. An ordinary digital signatu...
Abstract—In this paper, we first propose the definition and security model of certificate-based prox...
Abstract. Proxy re-signatures are generally used for the delegation of signing rights of a user (del...
[[abstract]]Hwang, Lu and Lin (2003) proposed a (t, n) threshold proxy signature scheme, based on th...
[[abstract]]In 1996, a new category of signature scheme called a proxy signature was proposed by Mam...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
AbstractIn proxy signature schemes, original signers delegate proxy signers to sign messages on beha...
Proxy signature is a useful cryptographic primitive that has been widely used in many applications. ...
A (t, n) threshold proxy signature scheme allows t or more proxy signers out of a designated group o...
AbstractIn proxy signature schemes, original signers delegate proxy signers to sign messages on beha...
Digital signature scheme is an important research topic in cryptography. An ordinary digital signatu...
Abstract—In this paper, we first propose the definition and security model of certificate-based prox...
Abstract. Proxy re-signatures are generally used for the delegation of signing rights of a user (del...
[[abstract]]Hwang, Lu and Lin (2003) proposed a (t, n) threshold proxy signature scheme, based on th...
[[abstract]]In 1996, a new category of signature scheme called a proxy signature was proposed by Mam...