Threshold proxy signatures

A (t, n) threshold proxy signature scheme allows t or more proxy signers from a designated group of n proxy signers to sign messages on behalf of an original signer. The authors review both Zhang's threshold proxy signature scheme and Kim's threshold proxy signature scheme. They show that Zhang's scheme suffers from some weaknesses and Kim's scheme suffers from a disadvantage. Based on Zhang's scheme, they propose a new threshold proxy signature scheme to defeat the weaknesses of Zhang's scheme and the disadvantage of Kim's scheme.

[1]  Tzonelih Hwang,et al.  On Zhang's Nonrepudiable Proxy Signature Schemes , 1998, ACISP.

[2]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[3]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[4]  Susan K. Langford Threshold DSS Signatures without a Trusted Party , 1995, CRYPTO.

[5]  Patrick Horster,et al.  Meta-ElGamal signature schemes , 1994, CCS '94.

[6]  B. Clifford Neuman,et al.  Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.

[7]  Vijay Varadharajan,et al.  An analysis of the proxy problem in distributed systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[8]  Torben P. Pedersen Distributed Provers with Applications to Undeniable Signatures , 1991, EUROCRYPT.

[9]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[10]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[11]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .