Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme
In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well as a proxy-protected version. They claimed their scheme had the properties of secrecy, unforgeability, non-repudiation and signer’s identification. In this study, we showed inter conspiracy attack on t...
Main Author: | Miao Xiao Yu |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2016-01-01
|
Series: | MATEC Web of Conferences |
Online Access: | http://dx.doi.org/10.1051/matecconf/20164402017 |
Similar Items
-
Threshold Proxy Signature based on GQ scheme
by: Chung-Yuan Huang, et al.
Published: (2003) -
Identity-based multi-proxy threshold signature scheme
by: Shao-nung Huang, et al.
Published: (2007) -
Dynamic Threshold Proxy-Protected Signature Scheme
by: Chung-Hsien Tsai, et al.
Published: (2006) -
Threshold One-Time Proxy Signature Scheme
by: Chih-Chun Tsai, et al.
Published: (2005) -
Proxy Signature Scheme Based on Elliptic Curve Cryptography
by: JungChen Liu, et al.
Published: (2004)