Due to the rapid growth in modern communication systems, fault tolerance and data security are two important issues in a secure transaction. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a secure proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.
 C.N. Zhang, “Integrated Approach for Fault Tolerance and Digital Signature in RSA,” IEEE Proceedings-Computers & Digital Techniques, vol. 146, no. 3, pp. 151-159, 1999
 N. Lee and W. Tsai, “Efficient Fault-tolerant Scheme basde on the RSA system,” IEEE Proceedings – Computer and Digital Techniques, vol. 150, no. 1, pp. 17-20, 2003.
 Xue, H. (2010) Improving the Fault-Tolerant Scheme Based on the RSA System. International Symposium on Computational Intelligence and Design, Hangzhou, 29-31 October 2010, 31-33.
 M. Mambo, K. Usuda, E. Okamoto, Proxy signature: delegation of the power to sign the message, IEICE Trans. Fundamentals E79-A (9) (1996) PP. 1338 - 1353.
 H. Elkamchouchi, M. R. M. Rizk, and Fatma Ahmed,” A New Secure Protocol for Authenticated Key Agreement,” IACSIT International Journal of Engineering and Technology, Vol. 5, No. 2, April 2013, pp.245-248
 Swati Verma and Birendra Kumar Sharma,” An Efficient Proxy Signature Scheme Based On RSA Cryptosystem,” International Journal of Advanced Science and Technology Vol. 51, February, 2013, pp.121-126
 B. Lee, H. Kim and K. Kim, “Secure mobile agent using strong non-designated proxy signature”, In: Information security and private (ACISP01), LNCS 2119, Springer-Verlag, (2001), pp. 474-486.
 B. Lee, H. Kim and K. Kim, “Strong proxy signature and its applications”, In: Proceeding of the 2001 symposium on cryptography and information security (SCIS01), vol. 2, no. 2, (2001), pp. 603-608.