Skip to Main Content
Skip Nav Destination
ASME Press Select Proceedings

International Conference on Information Technology and Computer Science, 3rd (ITCS 2011)

V. E. Muhin
V. E. Muhin
National Technical University of Ukraine
Search for other works by this author on:
W. B. Hu
W. B. Hu
Wuhan University
Search for other works by this author on:
No. of Pages:
ASME Press
Publication date:

Since the first (t,n) threshold proxy signature scheme was proposed, the threshold proxy signature has enjoyed a considerable amount of interest from the cryptographic research community. But most of existing threshold proxy signature schemes were pointed out some weaknesses, which were vulnerable to the well-known attacks, such as frame attack, public-key substitute attack, warrant attack, collusion attack and so on. In this paper, we propose a novel threshold proxy signature scheme, which can resist the attacks as mentioned above. Furthermore, compared to existing threshold proxy signature schemes based on discrete logarithms, our scheme is more efficient than them....

1. Introduction
2. Our Scheme
3. Discussions
4. Conclusions
This content is only available via PDF.
You do not currently have access to this chapter.
Close Modal

or Create an Account

Close Modal
Close Modal