Security Analysis of A Proxy Signature Scheme Based on the Elliptic Curve Cryptosystem

Y Wu,YP Zhang,TJ Cao
DOI: https://doi.org/10.3969/j.issn.1000-1220.2006.05.007
2005-01-01
Abstract:In a secure proxy signature scheme, only the designated proxy signer could create a valid proxy signature on behalf of the original signer. Based on the elliptic curve discrete logarithm problem, Ji and Li proposed a proxy signature scheme and a proxy multi-signature scheme and Chen et al. proposed two proxy multi-signature schemes. However, in their schemes, the original signer can forge proxy secret key. To eliminate the original signers forgery attacks, a modification of the proxy key generation stage is proposed. Security analysis of the improved scheme is also presented.
What problem does this paper attempt to address?