Research Article

Cryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers

Table 2

A comparison of threshold proxy signature schemes based on proxy requirements.

Serial numberProxy signature scheme/requirementsKim et al. Sun et al. HLLWen et al. Enhanced scheme

1SecrecyYesYesNoNoYes
2Proxy protectionNoNoNoNoYes
3UnforgeabilityYesNoNoNoYes
4NonrepudiationYesYesNoNoYes
5Time-constraintNoNoYesYesYes
6Known signersNoYesNoNoYes