[Resource Topic] 2010/400: Security Analysis of a Threshold Proxy Signature Scheme

Welcome to the resource topic for 2010/400

Title:
Security Analysis of a Threshold Proxy Signature Scheme

Authors: Kitae Kim, Dahun Nyang

Abstract:

The t-out-of-n threshold proxy signatures allow an original signer to delegate his signing capability to a group of proxy signers, and t or more proxy signers can generate valid signatures by cooperating. Recently, Liu and Huang proposed a variant of threshold proxy signature scheme in which all proxy signers remain anonymous. The authors claimed their construction satisfies unforgeability, proxy signer’s deviation, identifiability, undeniability and verifiability. In this paper, however, we show that their scheme does not provide the proxy signer’s deviation and identifiability requirements.

ePrint: https://eprint.iacr.org/2010/400

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .