期刊名称:International Journal of Computer Science & Technology
印刷版ISSN:2229-4333
电子版ISSN:0976-8491
出版年度:2013
卷号:4
期号:1
页码:628-632
语种:English
出版社:Ayushmaan Technologies
摘要:Tzeng et al. proposed a threshold multi-proxy multi-signature scheme with threshold verification. Recently, Hsu et al. pointed out that Tzeng et al.’s scheme was vulnerable to insider attacks and proposed an improvement to eliminate the pointed out security leak. They had shown that Hsu et al.’s improvement cannot resist the frame attack. That is, after intercepting a valid proxy signature, an adversary can change the original singers to himself and forge a proxy signature. We will further compare and analyze all these schemes and further propose our scheme which will resist all security leak outs of various schemes.