Research Article
Cryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
Table 2
A comparison of threshold proxy signature schemes based on proxy requirements.
| Serial number | Proxy signature scheme/requirements | Kim et al. | Sun et al. |
HLL | Wen et al. | Enhanced scheme |
| 1 | Secrecy | Yes | Yes | No | No | Yes | 2 | Proxy protection | No | No | No | No | Yes | 3 | Unforgeability | Yes | No | No | No | Yes | 4 | Nonrepudiation | Yes | Yes | No | No | Yes | 5 | Time-constraint | No | No | Yes | Yes | Yes | 6 | Known signers | No | Yes | No | No | Yes
|
|
|