Threshold proxy signatures

Citation
Hm. Sun et al., Threshold proxy signatures, IEE P-COM D, 146(5), 1999, pp. 259-263
Citations number
20
Categorie Soggetti
Computer Science & Engineering
Journal title
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES
ISSN journal
13502387 → ACNP
Volume
146
Issue
5
Year of publication
1999
Pages
259 - 263
Database
ISI
SICI code
1350-2387(199909)146:5<259:TPS>2.0.ZU;2-9
Abstract
A (t, n) threshold proxy signature scheme allows t or more proxy signers fr om a designated group of n proxy signers to sign messages on behalf of an o riginal signer. The authors review both Zhang's threshold proxy signature s cheme and Kim's threshold proxy signature scheme. They show that Zhang's sc heme suffers from some weaknesses and Kim's scheme suffers from a disadvant age. Based on Zhang's scheme, they propose a new threshold proxy signature scheme to defeat the weaknesses of Zhang's scheme and the disadvantage of K im's scheme.