Cryptanalysis of an Eliptic Curve Based Threshold Proxy Signature Scheme

2014 ◽  
Vol 926-930 ◽  
pp. 3604-3607
Author(s):  
Xiao Yu Miao ◽  
Guang Guo Han

In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well as a proxy-protected version. They claimed that their scheme had the properties of secrecy, unforgeability, non-repudiation and signer’s identification, and the proxy-protected version could assure the proxy-protection property. In this paper, we show attacks on the basic scheme and we also point out that even if the central authority is engaged, the basic model is not proxy-protected.

2011 ◽  
Vol 130-134 ◽  
pp. 291-294
Author(s):  
Guang Liang Liu ◽  
Sheng Xian Xie ◽  
Wei Fu

On the elliptic curve cryptosystem proposed a new multi-proxy signature scheme - (t, k, n) threshold blind proxy signature scheme.In new program blind proxy signature and (t,k,n) threshold secret sharing scheme will be combined, and will not over-concentration of the rights of the blind proxy signer .Computation of the program is small, security is high, the achieve efficiency and the utility is better .can prevent a malicious user's forgery attack and have the security properties of proxy signature.


2001 ◽  
Vol 58 (2) ◽  
pp. 119-124 ◽  
Author(s):  
Chien-Lung Hsu ◽  
Tzong-Sun Wu ◽  
Tzong-Chen Wu

Sign in / Sign up

Export Citation Format

Share Document