Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability

2005 ◽  
Vol 164 (1) ◽  
pp. 201-225 ◽  
Author(s):  
Chien-Lung Hsu ◽  
Tzong-Sun Wu
2011 ◽  
Vol 135-136 ◽  
pp. 316-320
Author(s):  
Qi Xie

Signature schemes with message recovery based on self-certified public keys can reduce the amount of communications and computations, since the signature verification, the public key authentication and the message recovery are simultaneously carried out in a single logical step. Integrating self-certified public-key systems and the message recovery signature schemes, in 2009, Wu et al. proposed two multi-proxy signatures based on the discrete logarithms over a finite field and the elliptic curve discrete logarithms. The proxy warrant revision attacks are proposed, and it will show that Wu et al.’s schemes can not resist the proxy warrant revision attacks by either the proxy group or the original signer.


2009 ◽  
Vol 10 (2) ◽  
pp. 290-300 ◽  
Author(s):  
Tzong-sun Wu ◽  
Chien-lung Hsu ◽  
Han-yu Lin

Informatica ◽  
2003 ◽  
Vol 14 (2) ◽  
pp. 205-212 ◽  
Author(s):  
Shin‐Jia Hwang ◽  
Chiu‐Chin Chen

Sign in / Sign up

Export Citation Format

Share Document