Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme
In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well as a proxy-protected version. They claimed their scheme had the properties of secrecy, unforgeability, non-repudiation and signer’s identification. In this study, we showed inter conspiracy attack on t...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2016-01-01
|
Series: | MATEC Web of Conferences |
Online Access: | http://dx.doi.org/10.1051/matecconf/20164402017 |
id |
doaj-d2676220bf05471aa2ff04498e8cc4d9 |
---|---|
record_format |
Article |
spelling |
doaj-d2676220bf05471aa2ff04498e8cc4d92021-02-02T09:12:29ZengEDP SciencesMATEC Web of Conferences2261-236X2016-01-01440201710.1051/matecconf/20164402017matecconf_iceice2016_02017Improvement of an Eliptic Curve Based Threshold Proxy Signature SchemeMiao Xiao YuIn 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well as a proxy-protected version. They claimed their scheme had the properties of secrecy, unforgeability, non-repudiation and signer’s identification. In this study, we showed inter conspiracy attack on the basic scheme and gave another attack on the proxy-protected version. We pointed out that even if the central authority is engaged, the basic model is not a proxy-protected one. We also proposed an improved scheme that can resist the known attacks to achieve higher security, and gave the security analysis of the improved scheme in detail.http://dx.doi.org/10.1051/matecconf/20164402017 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Miao Xiao Yu |
spellingShingle |
Miao Xiao Yu Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme MATEC Web of Conferences |
author_facet |
Miao Xiao Yu |
author_sort |
Miao Xiao Yu |
title |
Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme |
title_short |
Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme |
title_full |
Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme |
title_fullStr |
Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme |
title_full_unstemmed |
Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme |
title_sort |
improvement of an eliptic curve based threshold proxy signature scheme |
publisher |
EDP Sciences |
series |
MATEC Web of Conferences |
issn |
2261-236X |
publishDate |
2016-01-01 |
description |
In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well as a proxy-protected version. They claimed their scheme had the properties of secrecy, unforgeability, non-repudiation and signer’s identification. In this study, we showed inter conspiracy attack on the basic scheme and gave another attack on the proxy-protected version. We pointed out that even if the central authority is engaged, the basic model is not a proxy-protected one. We also proposed an improved scheme that can resist the known attacks to achieve higher security, and gave the security analysis of the improved scheme in detail. |
url |
http://dx.doi.org/10.1051/matecconf/20164402017 |
work_keys_str_mv |
AT miaoxiaoyu improvementofanelipticcurvebasedthresholdproxysignaturescheme |
_version_ |
1724295564276793344 |