Cryptanalysis of an Eliptic Curve Based Threshold Proxy Signature Scheme

Article Preview

Abstract:

In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well as a proxy-protected version. They claimed that their scheme had the properties of secrecy, unforgeability, non-repudiation and signer’s identification, and the proxy-protected version could assure the proxy-protection property. In this paper, we show attacks on the basic scheme and we also point out that even if the central authority is engaged, the basic model is not proxy-protected.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 926-930)

Pages:

3604-3607

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] M. Mambo, K. Usuda and E. Okamoto: IEICE Transactions on Fundamentals, E79-A(9), 1996, 1338-1353.

Google Scholar

[2] S. Kim, S. Park, and D. Won: Proc. Information and Communications Security-ICIS'97, LNCS1334, Spring-Verlag, Berlin, 1997, 223-232.

Google Scholar

[3] K. Zhang: Proc. Information Security Workshop-ISW'97, LNCS1396, Spring-Verlag, Berlin, 1997, 191-197.

Google Scholar

[4] Q. Xie: Applied Mathematics and Computeation, Vol. 168(2), 2005, 776-782.

Google Scholar

[5] Z. H. Shao: Fundamenta Informaticae, Vol. 104(4), 2010, 385-392.

Google Scholar

[6] J. Pomykala, S. Barabasz: Fundamenta Informaticae, Vol. 69(4), 2006, 411-425.

Google Scholar

[7] R. B. Lu, D. K. He, C. J. Wang: Journal of Electronics &Information Technology, Vol. 30(1), 2008, 100-103.

Google Scholar