Research Article
Cryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
Table 1
History of threshold proxy signature schemes.
| Serial number | Scheme | Method |
| 1 |
Rivest et al. [1] | The Lagrange interpolating polynomial and linear projective geometry | 2 | ElGamal [2] | Discrete logarithms | 3 |
Desmedt and Frankel [3] | RSA and Lagrange coefficient | 4 | Zhang [4] | Discrete logarithms | 5 | Kim et al. [5] | Discrete logarithms | 6 | Sun et al. [6] | Discrete logarithms | 7 |
Lee | Discrete logarithms | 8 | Hwang et al. [7] | RSA and Lagrange coefficient | 9 | Wang et al. [8] | RSA and Lagrange coefficient | 10 | Kuo and Chen [9] | RSA and Lagrange coefficient | 11 |
H. Jiang (2007) | RSA and Lagrange coefficient | 12 |
Fanyu (2007) | RSA and Lagrange coefficient | 13 |
Li et al. [10] | RSA and Lagrange coefficient | 14 |
Yong-Jun et al. [11] | RSA and Lagrange coefficient |
|
|