Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme

In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well as a proxy-protected version. They claimed their scheme had the properties of secrecy, unforgeability, non-repudiation and signer’s identification. In this study, we showed inter conspiracy attack on t...

Full description

Bibliographic Details
Main Author: Miao Xiao Yu
Format: Article
Language:English
Published: EDP Sciences 2016-01-01
Series:MATEC Web of Conferences
Online Access:http://dx.doi.org/10.1051/matecconf/20164402017
id doaj-d2676220bf05471aa2ff04498e8cc4d9
record_format Article
spelling doaj-d2676220bf05471aa2ff04498e8cc4d92021-02-02T09:12:29ZengEDP SciencesMATEC Web of Conferences2261-236X2016-01-01440201710.1051/matecconf/20164402017matecconf_iceice2016_02017Improvement of an Eliptic Curve Based Threshold Proxy Signature SchemeMiao Xiao YuIn 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well as a proxy-protected version. They claimed their scheme had the properties of secrecy, unforgeability, non-repudiation and signer’s identification. In this study, we showed inter conspiracy attack on the basic scheme and gave another attack on the proxy-protected version. We pointed out that even if the central authority is engaged, the basic model is not a proxy-protected one. We also proposed an improved scheme that can resist the known attacks to achieve higher security, and gave the security analysis of the improved scheme in detail.http://dx.doi.org/10.1051/matecconf/20164402017
collection DOAJ
language English
format Article
sources DOAJ
author Miao Xiao Yu
spellingShingle Miao Xiao Yu
Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme
MATEC Web of Conferences
author_facet Miao Xiao Yu
author_sort Miao Xiao Yu
title Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme
title_short Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme
title_full Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme
title_fullStr Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme
title_full_unstemmed Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme
title_sort improvement of an eliptic curve based threshold proxy signature scheme
publisher EDP Sciences
series MATEC Web of Conferences
issn 2261-236X
publishDate 2016-01-01
description In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well as a proxy-protected version. They claimed their scheme had the properties of secrecy, unforgeability, non-repudiation and signer’s identification. In this study, we showed inter conspiracy attack on the basic scheme and gave another attack on the proxy-protected version. We pointed out that even if the central authority is engaged, the basic model is not a proxy-protected one. We also proposed an improved scheme that can resist the known attacks to achieve higher security, and gave the security analysis of the improved scheme in detail.
url http://dx.doi.org/10.1051/matecconf/20164402017
work_keys_str_mv AT miaoxiaoyu improvementofanelipticcurvebasedthresholdproxysignaturescheme
_version_ 1724295564276793344