<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf14206</article-id><article-id pub-id-type="doi">10.15388/Informatica.2003.015</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Hwang</surname><given-names>Shin‐Jia</given-names></name><email xlink:href="mailto:sjhwang@mail.tku.edu.tw">sjhwang@mail.tku.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><aff id="j_INFORMATICA_aff_000">Department of Computer Science and Information Engineering, TamKang University, Tamsui, Taipei Hsien, 251, Taiwan, ROC</aff></contrib-group><contrib-group><contrib contrib-type="Author"><name><surname>Chen</surname><given-names>Chiu‐Chin</given-names></name><email xlink:href="mailto:s8914604@mail.cyut.edu.tw">s8914604@mail.cyut.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><aff id="j_INFORMATICA_aff_001">Department of Information Management, Chaoyang University of Technology, Wufeng, Taichung Country, 413, Taiwan, ROC</aff></contrib-group><pub-date pub-type="epub"><day>01</day><month>01</month><year>2003</year></pub-date><volume>14</volume><issue>2</issue><fpage>205</fpage><lpage>212</lpage><history><date date-type="received"><day>01</day><month>11</month><year>2002</year></date></history><abstract><p>Sun's nonrepudiation threshold proxy signature scheme is not secure against the collusion attack. In order to guard against the attack, Hwang et al. proposed another threshold proxy signature scheme. However, a new attack is proposed to work on both Hwang et al.'s and Sun's schemes. By executing this attack, one proxy signer and the original signer can forge any valid proxy signature. Therefore, both Hwang et al.'s scheme and Sun's scheme were insecure.</p></abstract><kwd-group><label>Keywords</label><kwd>digital signature</kwd><kwd>proxy signature</kwd><kwd>threshold proxy signature</kwd></kwd-group></article-meta></front></article>