16
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Attacks on provably secure proxy-protected signature schemes based on factoring

&
Pages 193-204 | Received 01 Apr 2006, Published online: 03 Jun 2013

References

  • ElGamal , T. 1985 . Public key cryptosystem and a signature scheme based on discrete logarithms . IEEE Transactions on Information Theory , 31 ( 4 ) : 469 – 472 .
  • Huang , H. F. and Chang , C. C. 2003 . An efficient and practical (t, n) threshold proxy signature scheme with known signers . Fundamenta Informaticae , 56 ( 3 ) : 243 – 253 .
  • Huang , H. F. and Chang , C. C. 2006 . A novel efficient (t, n) threshold proxy signature scheme . Information Sciences , 176 ( 10 ) : 1338 – 1349 .
  • Hwang , M. S. , Lin , I. C. and Lu , E. J. L. 2000 . Secure nonrepudiable threshold proxy signature scheme with known signers . International Journal of Informatica , 11 ( 2 ) : 1 – 8 .
  • Hwang , M. S. , Lu , E. J. L. and Lin , I. C. 2003 . Practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem . IEEE Transactions on Knowledge and Data Engineering , 15 ( 6 ) : 1552 – 1560 .
  • Lin , M. H. , Chang , C. C. and Chen , Y. R. 2004 . Fair and secure mobile agent environment based on blind signature and proxy host . Computers & Security , 23 : 199 – 212 .
  • Mambo , M. , Usuda , K. and Okamoto , E. 1996 . Proxy signatures: delegation of the power to sign message . IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences , E79-A ( 9 ) : 1338 – 1354 .
  • Mambo , M. , Usuda , K. and Okamoto , E. Proxy signatures for delegation signing operation . Proceedings of the Third ACM Conference on Computer and Communication Security . New Delhi , India . pp. 48 – 57 . in
  • Park , J. H. , Kang , B. G. and Han , J. W. 2005 . Cryptanalysis of Zhou et al. proxy-protected signature schemes . Applied Mathematics and Computation , 169 ( 1 ) : 192 – 197 .
  • Park , J. H. and Kang , B. G. 2005 . Security of Lu et al. proxy-protected signature scheme . Applied Mathematics and Computation , 169 ( 2 ) : 1010 – 1015 .
  • Rabin , M. O. 1978 . Digitalized Signatures, Foundations of Secure Communication , 155 – 168 . Academic Press .
  • Rivest , R. , Shamir , A. and Adleman , L. 1978 . Method for obtaining digital signatures and public-key cryptosystems . Communications of ACM , 21 ( 2 ) : 120 – 126 .
  • Wang , G. , Bao , F. , Zhou , J. and Deng , R. H. 2004 . Comments on practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem . IEEE Transactions on Knowledge and Data Engineering , 16 ( 10 ) : 1309 – 1311 .
  • Zhou , Y. , Cao , Z. and Lu , R. 2005 . Provably secure proxy-protected signature schemes based on factoring . Applied Mathematics and Computation , 164 ( 1 ) : 83 – 98 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.