Oct 21, 2014 · A threshold proxy signature scheme has a group of n proxy signers and we decide a threshold value t, less than or equal to n. A valid proxy ...
In particular, our scheme applies the (t, n) threshold proxy signature scheme and allows any t or more then t signers to form a designated group from n proxy ...
In this research paper, secret sharing proxy signature could permit the shares of designated signers, called proxy signers, renew their own proxy shares ...
Many threshold proxy signature schemes are proposed in which the t out of n threshold schemes are deployed; but they still lack the property of security.
Raman Kumar, Harsh Kumar Verma, Renu Dhir: Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers.
In this scheme, a (t,n) threshold proxy signature scheme based on RSA, any t or more proxy signers can cooperatively generate a proxy signature while t-1 or ...
Missing: Design | Show results with:Design
Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer and then the proxy signer generates a signing ...
In this paper we propose and analyze a new RSA-based proxy signature scheme and its corresponding (t,n) threshold scheme. Unlike numerous previous research ...
... Analysis and. Design of Protocol for Enhanced Threshold Proxy Signature Scheme. Based on RSA for Known Signers” Wireless Personal Communications, vol. 80 pp ...
May 31, 2024The threshold proxy signature scheme uses the RSA cryptosystem to generate the private and the public key of the signers (Rivest et al., 1978).