Security Analysis and Implementation of an Improved Cch2 Proxy Multi-Signature Scheme

Full Text (PDF, 530KB), PP.46-54

Views: 0 Downloads: 0


Raman Kumar 1,*

1. Department of Computer Science and Engineering, D A V Institute of Engineering and Technology, Jalandhar, Punjab, India

* Corresponding author.


Received: 24 Jul. 2013 / Revised: 17 Nov. 2013 / Accepted: 26 Jan. 2014 / Published: 8 Mar. 2014

Index Terms

Proxy Signature, Enforceability, Secret Sharing


Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed; but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multi-signature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity and computational overhead of improved CCH1 and CCH2 proxy multi-signature schemes. We have presented cryptanalysis of improved CCH2 proxy multi-signature scheme and showed that improved CCH2 scheme is suffered from various attacks i.e. forgery attack and framing attack.

Cite This Paper

Raman Kumar, "Security Analysis and Implementation of an Improved Cch2 Proxy Multi-Signature Scheme", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.4, pp.46-54, 2014. DOI:10.5815/ijcnis.2014.04.06


[1]V.S. Miller, “Uses of Elliptic Curves in Cryptography”, Advances in Cryptology - Crypo'85, LNCS 218, pp. 417-426, 1985.
[2]N. Koblitz, “Elliptic Curve Cryptosystems”, Mathematics of Computation (AMC), Vo1.48, No.177, pp. 203-209, 1987.
[3]M. Mambo, K. Usuda, and E. Okamoto, “Proxy Signatures for Delegating Signing Operation”, Proc. 3rd ACM Conference on Computer and Communications Security, ACM press, pp.48-57, 1996.
[4]M. Mambo, K. Usuda, and E. Okamoto, “Proxy signature: Delegation of the power to sign messages”, IEICE Trans. Fundamentals, Vol. E79-A, No. 9, pp. 1338-1353, Sep. 1996.
[5]S. Kim, S. Park, and D. Won, “Proxy signatures, revisited”, Information and Communications Security -ICICS’97, LNCS 1334, pp. 223-232, 1997.
[6]L. Yi, G. Bai and G. Xiao, “Proxy Multi-signature Scheme: A New Type of Proxy Signature”, Electronics Letters, Vol. 36, Issue.6, pp. 527-528, 2000.
[7]H. M. Sun, “On Proxy Multisignature Schemes”, Proceedings of the International Computer Symposium, pp.65-72, 2000.
[8]B. Lee, H. Kim, and K. Kim, “Strong proxy signature and its application”, In Proceedings of SCIS, pp. 603- 608, 2001.
[9]T. S. Chen, T. P Liu, and Y. F Chung, “A Proxy-Protected Proxy Signature Scheme Based on Elliptic Curve Cryptosystem”, Proc. Of IEEE TENCOM, pp. 184-187, 2002.
[10]T.S. Chen, Y.F. Chung and G.S. Huang, “Efficient proxy multisignature schemes based on the elliptic curve cryptosystem”, Computers & Security, Elsevier, Vol. 22, No. 6, pp 527-534, 2003.
[11]T.S. Chen, Y.F. Chung, G.S. Huang, “A traceable proxy multi-signature scheme based on the elliptic curve cryptosystem”, Applied Mathematics Computation, Elsevier, Vol. 1591 No. 1, pp 137–145, 2004.
[12]M.S. Hwang, S.F. Tzeng and C.S. Tsai, “Generalization of proxy signature based on elliptic curves”, Computers Standard & Interfaces, Elsevier, Vol. 26, Issue 2, pp. 73-84, 2004.
[13]G. L. Wang, F. Bao, J. Y. Zhou, and R. H. Deng, “Security Analysis of Some Proxy Signatures”, Information Security and Cryptology, LNCS 2971, pp.305-319, 2004.
[14]S. Wang, G. Wang, F. Bao and J. Wang, “Cryptanalysis of A Proxy-Protected Proxy Signature scheme based on Elliptic Curve Cryptosystem”, IEEE, pp 3240-3243, 2004.
[15]J.H. Park, B.G. Kang, S. Park, “Cryptanalysis of Some Group-Oriented Proxy Signature Schemes”, LNCS, vol. 3786, pp. 10–24, 2006.
[16]Feng Cao, Zhenfu Cao, “Cryptanalysis on a Proxy Multi-Signature Scheme”, Proceeding of the first international Multi-symposiums on computer and computational Sciences(IMSCCS), IEEE, Vol. 2, pp. 117-120, 2006.
[17]M.H. Chang, I.T. Chen and M.T. Chen, “Design of Proxy Signature in ECDSA”, IEEE, 2008, pp 17-22, 2006.
[18]Fengying Li, Qingshui Xue, “Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem”, Communications in Computer and Information Science, Vol. 234, pp. 101-109, 2011.
[19]Sheetal Kalra, Sandeep K. Sood, “Elliptic Curve Cryptography: Survey and its Security
[20]Applications”,ACAI Proceedings of the International Conference on Advances in Computing and Artificial Intelligence,ACM, pp 102-106,2011.
[21]I. Tutanescu, C. Anton, L. Ionescu and D. Caragata, “Elliptic Curves Cryptosystems Approaches”, IEEE, pp 357-362, 2012.
[22]Elliptic curve cryptography tutorial:
[23]Harsh Kumar Verma, Kamalpreet Kaur and Raman Kumar, "A Comparison of Threshold Proxy Signature Scheme", The 2008 International Conference on Security and Management, USA, 14-17 July, 2008.
[24]Raman Kumar and Harsh Kumar Verma, "An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for Known Signers", IEEE 2nd International Advance Computing Conference, Thapar University, India, 19-20 February, 2010.
[25]Raman Kumar and Harsh Kumar Verma, "Secure Threshold Proxy Signature Scheme Based on RSA for Known Signers", Journal of Information Assurance and Security, JIAS, Vol. 5, Issue 1, pp. 319-326, 2010.