| Article ID | Journal | Published Year | Pages | File Type |
|---|---|---|---|---|
| 9506418 | Applied Mathematics and Computation | 2005 | 6 Pages |
Abstract
Recently, Lu et al. presented a proxy-protected signature scheme that is based on the improved Rabin signature. We show that their scheme does not satisfy a security requirement necessary for proxy signature schemes. This results in generating proxy signatures without any permission from an original signer.
Related Topics
Physical Sciences and Engineering
Mathematics
Applied Mathematics
Authors
Je Hong Park, Bo Gyeong Kang,
