Security Analysis And Improvement Of Some Threshold Proxy Signature Schemes

Qs Xue,Zf Cao
2004-01-01
Abstract:We review Hsu et al's threshold proxy signature scheme with known signers, describe the Tsai et al's attack to Hsu et al's scheme and point out that their attack can't work. We also review Hsu et al's another scheme with unknown signers, analyze its security and point out that it can not resist the public key substitution attack. Based on Hsu et al's second scheme, an improved version which can resist the weakness is proposed.
What problem does this paper attempt to address?