@inproceedings{eca6b2258ad848d0af02ad5c2c33f69b,
title = "On zhang{\textquoteright}s nonrepudiable proxy signature schemes",
abstract = "In 1997, Zhang proposed two new nonrepudiable proxy signature schemes to delegate signing capability. Both schemes claimed to have a property of knowing that a proxy signature is generated by either the original signer or a proxy signer. However, this paper will show that Zhang's second scheme fails to possess this property. Moreover, we shall show that the proxy signer can cheat to get the original signer's signature, if Zhang's scheme is based on some variants of E1Gamal-type signature schemes. We modify Zhang's nonrepudiable proxy signature scheme to avoid the above attacks. The modified scheme also investigates a new feature for the original signer to limit the delegation time to a certain period.",
author = "Lee, {Narn Yih} and Tzonelih Hwang and Wang, {Chih Hung}",
note = "Publisher Copyright: {\textcopyright} Springer-Verlag Berlin Heidelberg 1998.; 3rd Australasian Conference on Information Security and Privacy, ACISP 1998 ; Conference date: 13-07-1998 Through 15-07-1998",
year = "1998",
doi = "10.1007/bfb0053752",
language = "English",
isbn = "3540647325",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "415--422",
editor = "Colin Boyd and Ed Dawson",
booktitle = "Information Security and Privacy - 3rd Australasian Conference, ACISP 1998, Proceedings",
address = "Germany",
}