Security Analysis and Implementation of an Improved Cch2 Proxy Multi-Signature Scheme
نویسنده
چکیده
Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed; but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multi-signature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity and computational overhead of improved CCH1 and CCH2 proxy multi-signature schemes. We have presented cryptanalysis of improved CCH2 proxy multi-signature scheme and showed that improved CCH2 scheme is suffered from various attacks i.e. forgery attack and framing attack. Index Terms — Proxy Signature; Enforceability; Secret Sharing.
منابع مشابه
On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification
In 2004, Tzeng, Yang and Hwang proposed a nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. However, Bao, Cao and Wang pointed out that Tzeng et al.’s scheme cannot resist frame attacks and therefore presented an improved version. In this paper, we will show that there is another security flaw existing in both Tzeng et al.’s scheme and Bao et al.’s scheme.
متن کاملCryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme
Cao-Cao’s recently proposed an identity-based proxy signature scheme and claim that the scheme is provably secure in random oracle model. In this paper we have reviewed the scheme and proven that the scheme is vulnerable to chosen message attack under the defined security model. To prevent this attack, we propose an improved version of the scheme. A Proxy multi-signature scheme allows an author...
متن کاملA Proxy Multi-Signature Scheme with Anonymous Vetoable Delegation
Frequently a group of people jointly decide and authorize a specific person as a representative in some business/poitical occasions, e.g., the board of a company authorizes the chief executive officer to close a multi-billion acquisition deal. In this paper, an integrated proxy multi-signature scheme that allows anonymously vetoable delegation is proposed. This protocol integrates mechanisms of...
متن کاملConvertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملCryptanalysis and Improvement of a Certificateless Multi-proxy Signature Scheme
Multi-proxy signature allows an original signer authorizing a proxy group as his proxy agent and only the cooperation of all proxy signers in the group can create a proxy signature on behalf of the original signer. Recently, Jin and Wen defined a formal model of certificateless multi-proxy signature and proposed a concrete scheme. They claimed that their scheme is provably secure in their secur...
متن کامل