@inproceedings{7dc724da7735490fa9800dd9f0150c54,
title = "Repudiation of cheating and non-repudiation of Zhang{\textquoteright}s proxy signature schemes",
abstract = "The paper discusses the correctness of Lee, Hwang and Wang{\textquoteright}s comments on on Zhang{\textquoteright}s proxy signature schemes. In particular, it is shown that the cheating attack proposed by Lee, Hwang and Wang can be detected by the owner of the signature scheme. It is argued that considering the context in which proxy signatures are used, the attack is not a security problem. The work is concluded by a discussion about the non-repudiation controversy incorrectly observed by Lee, Hwang and Wang.",
keywords = "Cryptography, Digital Signatures, ElGa-mal signatures, Proxy Signatures",
author = "Hossein Ghodosi and Josef Pieprzyk",
year = "1999",
month = apr,
doi = "10.1007/3-540-48970-3_11",
language = "English",
isbn = "3540657568",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer, Springer Nature",
pages = "129--134",
editor = "Josef Pieprzyk and Rei Safavi-Naini and Jennifer Seberry",
booktitle = "Information Security and Privacy",
address = "United States",
note = "4th Australasian Conference on Information Security and Privacy, ACISP - 1999 ; Conference date: 07-04-1999 Through 09-04-1999",
}