Abstract:A secure threshold proxy signature scheme is proposed aiming at conspiracy attack, that is, any t (t is threshold value) or more malicious proxy signatures may work together to reconstruct the secret polynomial of the proxy group and derive the secret keys of other members in the proxy group, consequently they can impersonate some other proxy signers to generate a valid threshold proxy signature. The new scheme can not only satisfy the properties of the threshold proxy signature, but also withstand the conspiracy attack. Furthermore, the proxy signer’s proxy signing capability can be revoked if the original signer needs.