DocumentCode :
1291210
Title :
Threshold proxy signatures
Author :
Sun, H.-M. ; Lee, N.N. ; Hwang, T.
Author_Institution :
Dept. of Comput. Sci. & Inf., Nat. Cheng Kung Univ., Tainan, Taiwan
Volume :
146
Issue :
5
fYear :
1999
fDate :
9/1/1999 12:00:00 AM
Firstpage :
259
Lastpage :
263
Abstract :
A (t, n) threshold proxy signature scheme allows t or more proxy signers from a designated group of n proxy signers to sign messages on behalf of an original signer. The authors review both Zhang´s threshold proxy signature scheme and Kim´s threshold proxy signature scheme. They show that Zhang´s scheme suffers from some weaknesses and Kim´s scheme suffers from a disadvantage. Based on Zhang´s scheme, they propose a new threshold proxy signature scheme to defeat the weaknesses of Zhang´s scheme and the disadvantage of Kim´s scheme
Keywords :
authorisation; security of data; threshold proxy signatures;
fLanguage :
English
Journal_Title :
Computers and Digital Techniques, IEE Proceedings -
Publisher :
iet
ISSN :
1350-2387
Type :
jour
DOI :
10.1049/ip-cdt:19990647
Filename :
817540
Link To Document :
بازگشت