Abstract
A Proxy signature scheme enables a proxy signer to sign a message on behalf of the original signer. In this paper, we propose efficient and secure Proxy multi-signature scheme based on elliptic curve cryptosystem. Our scheme satisfy all the proxy requirements and require only elliptic curve multiplication and elliptic curve addition which needs less computation overhead compared to modular exponentiation also our scheme is withstand against original signer forgery and public key substitution attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Nonmember, B.L., Member, K.K.: Strong proxy signatures, December 13 (1999)
Hsu, C.-L., Wu, T.-S., He, W.-H.: New proxy multi-signature scheme. Applied Mathematics and Computation 162(3), 1201–1206 (2005)
Cao, F., Cao, Z.: Cryptanalysis on a proxy multi-signature scheme
Yi, G.X.L., Bai, G.: Proxy multi-signature scheme: a new type of proxy signature scheme. Electronics Letters 36, 134–138 (2000)
Sun, H.: On proxy multi-signature schemes. In: Proceedings of the International Computer Symposium, pp. 65–72 (2000)
Park, J.H., Kang, B.G., Park, S.: Cryptanalysis of Some Group-Oriented Proxy Signature Schemes. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 10–24. Springer, Heidelberg (2006)
Guilin Wang, J., Bao, F., Deng, R.H.: Proxy signature scheme with multiple original signers for wireless e-commerce applications. Infocomm Security Department, Institute for Infocomm Research (I2R). 21 Heng Mui Keng Terrace, Singapore 119-613. IEEE (2004)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Neuman, C. (ed.) Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48–57. ACM Press, New Delhi (March 1996)
Kim, S., Park, S., Won, D.: Proxy signatures. In: Proc. 1st International Information and Communications Security Conference, pp. 223–232 (1997)
Chen, T.-S., Chung, Y.-F., Huang, G.-S.: Efficient proxy multi-signature schemes based on the elliptic curve cryptosystem. Computers & Security 22(6), 527–534 (2003)
Chen, T.-S., Chung, Y.-F., Huang, K.-H.: A traceable proxy multi-signature scheme based on the elliptic curve cryptosystem. Applied Mathematics and Computation 159(1), 137–145 (2004)
Yuan, Y.: Improvement of Hsu-Wu-He’s Proxy Multi-signature Schemes. In: Jonker, W., Petković, M. (eds.) SDM 2005. LNCS, vol. 3674, pp. 234–240. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chouksey, R., Sivashankari, R., Singhai, P. (2012). ECDLP Based Proxy Multi-signature Scheme. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-31513-8_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31512-1
Online ISBN: 978-3-642-31513-8
eBook Packages: EngineeringEngineering (R0)