Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 429271, 13 pages
http://dx.doi.org/10.1155/2014/429271
Research Article

Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

Department of Computer Science and Engineering, DAV Institute of Engineering and Technology, Jalandhar, Punjab 144004, India

Received 28 August 2013; Revised 7 November 2013; Accepted 10 February 2014; Published 27 April 2014

Academic Editor: Wang Xing-yuan

Copyright © 2014 Raman Kumar and Nonika Singla. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. T. S. Chen, Y. F. Chung, and G. S. Huang, “Efficient proxy multisignature schemes based on the elliptic curve cryptosystem,” Computers and Security, vol. 22, no. 6, pp. 527–534, 2003. View at Publisher · View at Google Scholar · View at Scopus
  2. S. Wang, G. Wangt, F. Bao, and J. Wang, “Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem,” in Proceedings of the IEEE 60th Vehicular Technology Conference, VTC2004-Fall: Wireless Technologies for Global Security, pp. 3240–3243, September 2004. View at Scopus
  3. I. Tutanescu, C. Anton, L. Ionescu, and D. Caragata, “Elliptic curves cryptosystems approaches,” in Proceedings of the International Conference on Information Society (i-Society '12), pp. 357–362, 2012.
  4. M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures for delegating signing operation,” in Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48–57, March 1996. View at Scopus
  5. V. S. Miller, “Use of elliptic curves in cryptography,” in Advances in Cryptology-Crypo '85, vol. 218 of Lecture Notes in Computer Science, pp. 417–426, 1986. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  6. N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  7. H. M. Sun, “On proxy multisignature schemes,” in Proceedings of the International Computer Symposium, pp. 65–72, 2000.
  8. J. H. Park, B. G. Kang, and S. Park, Cryptanalysis of Some Group-Oriented Proxy Signature Schemes, vol. 3786 of Lecture Notes in Computer Science, 2006.
  9. C. Feng and C. Zhenfu, “Cryptanalysis on a proxy multi-signature scheme,” in Proceedings of the 1st International Multi- Symposiums on Computer and Computational Sciences (IMSCCS '06), vol. 2, pp. 117–120, IEEE, April 2006. View at Publisher · View at Google Scholar · View at Scopus
  10. M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures: delegation of the power to sign messages,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E79-A, no. 9, pp. 1338–1353, 1996. View at Google Scholar · View at Scopus
  11. S. Kim, S. Park, and D. Won, “Proxy signatures, revisited,” in Proceedings of the Information and Communications Security (ICICS '97), vol. 1334 of Lecture Notes in Computer Science, pp. 223–232, 1997.
  12. L. Yi, G. Bai, and G. Xiao, “Proxy multi-signature scheme: a new type of proxy signature scheme,” Electronics Letters, vol. 36, no. 6, pp. 527–528, 2000. View at Publisher · View at Google Scholar · View at Scopus
  13. B. Lee, H. Kim, and K. Kim, “Strong proxy signature and its application,” in Proceedings of the World Multiconference on Systemics, Cybernetics and Informatics (SCIS '01), pp. 603–608, 2001.
  14. T. S. Chen, T. P. Liu, and Y. F. Chung, “A proxy-protected proxy signature scheme based on elliptic curve cryptosystem,” in Proceedings of the IEEE TENCOM Region 10 Conference on Computers, Communications, Control and Power Engineering, pp. 184–187, October 2002. View at Scopus
  15. T. S. Chen, Y. F. Chung, and G. S. Huang, “A traceable proxy multisignature scheme based on the elliptic curve cryptosystem,” Applied Mathematics and Computation, vol. 159, no. 1, pp. 137–145, 2004. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  16. M. S. Hwang, S. F. Tzeng, and C. S. Tsai, “Generalization of proxy signature based on elliptic curves,” Computer Standards and Interfaces, vol. 26, no. 2, pp. 73–84, 2004. View at Publisher · View at Google Scholar · View at Scopus
  17. G. L. Wang, F. Bao, J. Y. Zhou, and R. H. Deng, “Security analysis of some proxy signatures,” in Information Security and Cryptology, vol. 2971 of Lecture Notes in Computer Science, pp. 305–319, 2004. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  18. M. H. Chang, I. T. Chen, and M. T. Chen, “Design of proxy signature in ECDSA,” in Proceedings of the 8th International Conference on Intelligent Systems Design and Applications (ISDA '08), pp. 17–22, November 2008. View at Publisher · View at Google Scholar · View at Scopus
  19. F. Li and Q. Xue, “Two improved proxy multi-signature schemes based on the elliptic curve cryptosystem,” Communications in Computer and Information Science, vol. 234, no. 4, pp. 101–109, 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. X. Wang and C. Yu, “Cryptanalysis and improvement on a cryptosystem based on a chaotic map,” Computers and Mathematics with Applications, vol. 57, no. 3, pp. 476–482, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  21. X. Wang and J. Zhao, “Cryptanalysis on a parallel keyed hash function based on chaotic neural network,” Neurocomputing, vol. 73, no. 16–18, pp. 3224–3228, 2010. View at Publisher · View at Google Scholar · View at Scopus
  22. X. Wang and G. He, “Cryptanalysis on a novel image encryption method based on total shuffling scheme,” Optics Communications, vol. 284, no. 24, pp. 5804–5807, 2011. View at Google Scholar
  23. X. Wang and L. Liu, “Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos,” Nonlinear Dynamics, vol. 73, no. 1-2, pp. 795–800, 2013. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  24. R. Kumar, H. K. Verma, and R. Dhir, “Cryptanalysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers,” Mathematical Problems in Engineering, vol. 2013, Article ID 790257, 24 pages, 2013. View at Publisher · View at Google Scholar · View at MathSciNet