Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA

@article{Li2007CrypanalysisOK,
  title={Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA},
  author={Fengying Li and Qingshui Xue and Zhenfu Cao},
  journal={Fourth International Conference on Information Technology (ITNG'07)},
  year={2007},
  pages={815-818}
}
In a (t,n) threshold proxy signature scheme, an original signer delegates a group of n proxy signers to sign messages on behalf of him or her. When the proxy signature is created, t or more proxy signers cooperate to generate valid proxy signatures and any less than t proxy signers can't cooperatively produce valid proxy signatures. In 2003, Hwang et al. proposed a practical threshold proxy signature scheme (HLL-scheme) which is based on RSA crypto system for the first time. In 2004, Wang et al… CONTINUE READING

From This Paper

Topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 17 references

Cryptographic Analysis and Modification of Proxy Multisignature Scheme

  • J. G. Li, Z. F. Cao, Y. C. Zhang, J. Z. Li
  • High Technology Letters,
  • 2003

Improvement of M- U-O and K-P-W Proxy Signature Schemes

  • J. G. Li, Z. F. Cao, Y. C. Zhang
  • Journal of Harbin Institute of Technology (New…
  • 2002

Similar Papers

Loading similar papers…