<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">0868-4952</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<publisher>
				<publisher-name>VU</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">inf14309</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2003.029</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>Improved Non‐Repudiable Threshold Proxy Signature Scheme with Known Signers</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="Author">
					<name>
						<surname>Tsai</surname>
						<given-names>Chwei‐Shyong</given-names>
					</name>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_001"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Tzeng</surname>
						<given-names>Shiang‐Feng</given-names>
					</name>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Hwang</surname>
						<given-names>Min‐Shiang</given-names>
					</name>
					<email xlink:href="mailto:mshwang@mail.cyut.edu.tw">mshwang@mail.cyut.edu.tw</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_002"/>
				</contrib>
				<aff id="j_INFORMATICA_aff_000">Department of Information Management, Chaoyang University of Technology, 168, Gifeng E. Rd., Wufeng, Taichung County, Taiwan 413, ROC</aff>
				<aff id="j_INFORMATICA_aff_001">Department of Information Management, National Taichung Institute of Technology, 129 Sec. 3, San‐min Rd., Taichung, Taiwan 404, ROC</aff>
				<aff id="j_INFORMATICA_aff_002">Department of Management Information Systems, National Chung Hsing University, 250, Kuo Kuang Road, Taichung, Taiwan 402, ROC</aff>
			</contrib-group>
			<pub-date pub-type="epub">
				<day>01</day>
				<month>01</month>
				<year>2003</year>
			</pub-date>
			<volume>14</volume>
			<issue>3</issue>
			<fpage>393</fpage>
			<lpage>402</lpage>
			<history>
				<date date-type="received">
					<day>01</day>
					<month>03</month>
					<year>2003</year>
				</date>
			</history>
			<abstract>
				<p>In 2001, Hsu et al. proposed a non‐repudiable threshold proxy signature with known signers. In their scheme, the proxy group cannot deny having signed the proxy signature if they did. However, Hsu et al.'s scheme is vulnerable to some attacks. A malicious original signer or malicious proxy signer can impersonate some other proxy signers to generate proxy signatures. In this article, we shall present our cryptanalysis of the Hsu et al.'s scheme. After that, we shall propose a new threshold proxy signature that can overcome the weaknesses.</p>
			</abstract>
			<kwd-group>
				<label>Keywords</label>
				<kwd>digital signature</kwd>
				<kwd>proxy signature</kwd>
				<kwd>threshold proxy signature</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>