Threshold proxy signatures

H. M. Sun, N. Y. Lee, Tzone-Lih Hwang

Research output: Contribution to journalArticlepeer-review

105 Citations (Scopus)

Abstract

A (t, n) threshold proxy signature scheme allows t or more proxy signers from a designated group of n proxy signers to sign messages on behalf of an original signer. The authors review both Zhang's threshold proxy signature scheme and Kim's threshold proxy signature scheme. They show that Zhang's scheme suffers from some weaknesses and Kim's scheme suffers from a disadvantage. Based on Zhang's scheme, they propose a new threshold proxy signature scheme to defeat the weaknesses of Zhang's scheme and the disadvantage of Kim's scheme.

Original languageEnglish
Pages (from-to)259-263
Number of pages5
JournalIEE Proceedings: Computers and Digital Techniques
Volume146
Issue number5
DOIs
Publication statusPublished - 1999 Dec 1

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Hardware and Architecture
  • Computational Theory and Mathematics

Fingerprint

Dive into the research topics of 'Threshold proxy signatures'. Together they form a unique fingerprint.

Cite this