Authors: Ya-Fen Chang, Chin-Chen Chang
Addresses: Graduate Institute of Accounting, National Chung Hsing University, Taichung 402, Taiwan ROC.; Department of Computer Science and Information Engineering, National Taichung Institute of Technology, Taichung 404, Taiwan, ROC. ' Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan 40724, ROC.; Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan 621, ROC.
Abstract: Hwang, Lu and Lin (2003) proposed a (t, n) threshold proxy signature scheme, based on the RSA cryptosystem. Later, Wang et al. (2004a) indicated that this scheme was insecure because the original signer|s private key could be derived. Moreover, the delegates| identities had to be chosen carefully. In this paper, we propose an improved RSA-based (t, n) threshold proxy signature scheme, which withstands this security flaw and also offers the convenience of choosing identities at will.
Keywords: cryptography; information security; computer security; proxy signature; RSA cryptosystems; (t, n) threshold; freewill identities; private key; identity choice.
International Journal of Information and Computer Security, 2007 Vol.1 No.1/2, pp.201 - 209
Published online: 31 Jan 2007 *Full-text access for editors Access for subscribers Purchase this article Comment on this article