Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme

In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well as a proxy-protected version. They claimed their scheme had the properties of secrecy, unforgeability, non-repudiation and signer’s identification. In this study, we showed inter conspiracy attack on t...

Full description

Bibliographic Details
Main Author: Miao Xiao Yu
Format: Article
Language:English
Published: EDP Sciences 2016-01-01
Series:MATEC Web of Conferences
Online Access:http://dx.doi.org/10.1051/matecconf/20164402017
Description
Summary:In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well as a proxy-protected version. They claimed their scheme had the properties of secrecy, unforgeability, non-repudiation and signer’s identification. In this study, we showed inter conspiracy attack on the basic scheme and gave another attack on the proxy-protected version. We pointed out that even if the central authority is engaged, the basic model is not a proxy-protected one. We also proposed an improved scheme that can resist the known attacks to achieve higher security, and gave the security analysis of the improved scheme in detail.
ISSN:2261-236X