Improvement of threshold proxy signature scheme

被引:28
作者
Hsu, Chien-Lung
Wu, Tzong-Sun
Wu, Tzong-Chen
机构
[1] Department of Information Management, National Taiwan University of Science and Technology, Taipei, ROC
[2] Department of Information Management, Huafan University, No. 1, Huafan Road, Shihtin Hsiang, Taipei Hsien,, ROC
来源
Applied Mathematics and Computation (New York) | 2003年 / 136卷 / 2-3期
关键词
Nonrepudiation; Threshold proxy signature; Verifiable secret sharing;
D O I
10.1016/S0096-3003(02)00043-7
中图分类号
学科分类号
摘要
Recently, Sun et al. pointed out some weaknesses of Zhang's threshold proxy signature scheme and a disadvantage of Kim's threshold proxy signature scheme. They further proposed a new (t,n) threshold proxy signature scheme based on Zhang's scheme to eliminate these drawbacks. Unfortunately, their scheme suffered from a weakness which is shown in this paper. The authors also propose an improvement to counter it. © 2002 Elsevier Science Inc. All rights reserved.
引用
收藏
页码:315 / 321
页数:6
相关论文
共 7 条
[1]  
Mambo M., Usuda K., Okamoto E., Proxy signatures for delegating signing operation, pp. 48-57, (1996)
[2]  
Varadharajan V., Allen P., Black S., An analysis of the proxy problem in distributed systems, pp. 225-275, (1991)
[3]  
Kim S., Park S., Won D., Proxy signatures, revisited, pp. 223-232, (1997)
[4]  
Zhang K., Threshold proxy signature schemes, pp. 191-197, (1997)
[5]  
Sun H.M., Lee N.Y., Hwang T., Threshold proxy signatures, IEE Proceedings – Computers and Digital Techniques, 146, 5, pp. 259-263, (1999)
[6]  
Pedersen T., Distributed provers with applications to undeniable signatures, pp. 221-238, (1991)
[7]  
Denning D.E.R., (1983)