Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem

被引:0
作者
Li, Fengying [1 ]
Xue, Qingshui [2 ]
机构
[1] East China Normal Univ, Dept Educ Informat Technol, Shanghai 200062, Peoples R China
[2] Shanghai Jiao Tong Univ, Tech Sch, Shanghai 201101, Peoples R China
来源
2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I | 2010年
关键词
Cryptography; digital signature; proxy signature; proxy multi-signature; elliptic curve cryptosystem; CRYPTANALYSIS; SIGNERS;
D O I
暂无
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
In, a proxy signature scheme, one original signer delegates a proxy signer to sign messages on behalf of the original signer. In a proxy multi-signature scheme, n original signers cooperate to delegate their signing power to one proxy signer. In 2003, Chen, Chung and Huang proposed one proxy-protected proxy multi-signature scheme (CCH1 scheme) based on the elliptic curve cryptosystem. Park et al. pointed out that CCH1 scheme is insecure, however, they didn't provide a modified scheme or new schemes. To resist the forgery attack from the original signer proposed by Park et al., based on CCH1 scheme, one improved scheme is proposed. In 2004, Chen, Chung and Huang proposed another proxy multi-signature scheme (CCH2 scheme) also based on the elliptic curve cryptosystem. By observation, Park et al. showed that CCH2 scheme can't resist the conspiracy attack from all original signers. As to CCH2 scheme, Park et al. neither provided an improved version or new version. Based on CCH2 scheme, a modified scheme is brought forward.
引用
收藏
页码:423 / 426
页数:4
相关论文
共 18 条
[1]  
[Anonymous], J HARBIN I TECHNOLOG
[2]  
[Anonymous], INT J INFORM
[3]  
[Anonymous], P 10 NAT C INF SEC T
[4]  
[Anonymous], J COMPUTER RES DEV
[5]   A traceable proxy multisignature scheme based on the elliptic curve cryptosystem [J].
Chen, TS ;
Chung, YF ;
Huang, KH .
APPLIED MATHEMATICS AND COMPUTATION, 2004, 159 (01) :137-145
[6]   Efficient proxy multisignature schemes based on the elliptic curve cryptosystem [J].
Chen, TS ;
Chung, YF ;
Huang, GS .
COMPUTERS & SECURITY, 2003, 22 (06) :527-534
[7]  
Hsu C.L., 2003, APPL MATH C IN PRESS
[8]   New nonrepudiable threshold proxy signature scheme with known signers [J].
Hsu, CL ;
Wu, TS ;
Wu, TC .
JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 58 (02) :119-124
[9]   Generalization of proxy signature based on elliptic curves [J].
Hwang, MS ;
Tzeng, SF ;
Tsai, CS .
COMPUTER STANDARDS & INTERFACES, 2004, 26 (02) :73-84
[10]  
Hwang SJ, 2003, INFORMATICA-LITHUAN, V14, P205