ECDLP Based Proxy Multi-signature Scheme

  • Ramanuj Chouksey
  • R. Sivashankari
  • Piyush Singhai
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)


A Proxy signature scheme enables a proxy signer to sign a message on behalf of the original signer. In this paper, we propose efficient and secure Proxy multi-signature scheme based on elliptic curve cryptosystem. Our scheme satisfy all the proxy requirements and require only elliptic curve multiplication and elliptic curve addition which needs less computation overhead compared to modular exponentiation also our scheme is withstand against original signer forgery and public key substitution attack.


Elliptic Curve Original Signer Signature Scheme Proxy Signer Proxy Signature Scheme 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Nonmember, B.L., Member, K.K.: Strong proxy signatures, December 13 (1999)Google Scholar
  2. 2.
    Hsu, C.-L., Wu, T.-S., He, W.-H.: New proxy multi-signature scheme. Applied Mathematics and Computation 162(3), 1201–1206 (2005)MathSciNetzbMATHCrossRefGoogle Scholar
  3. 3.
    Cao, F., Cao, Z.: Cryptanalysis on a proxy multi-signature schemeGoogle Scholar
  4. 4.
    Yi, G.X.L., Bai, G.: Proxy multi-signature scheme: a new type of proxy signature scheme. Electronics Letters 36, 134–138 (2000)Google Scholar
  5. 5.
    Sun, H.: On proxy multi-signature schemes. In: Proceedings of the International Computer Symposium, pp. 65–72 (2000)Google Scholar
  6. 6.
    Park, J.H., Kang, B.G., Park, S.: Cryptanalysis of Some Group-Oriented Proxy Signature Schemes. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 10–24. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  7. 7.
    Guilin Wang, J., Bao, F., Deng, R.H.: Proxy signature scheme with multiple original signers for wireless e-commerce applications. Infocomm Security Department, Institute for Infocomm Research (I2R). 21 Heng Mui Keng Terrace, Singapore 119-613. IEEE (2004)Google Scholar
  8. 8.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Neuman, C. (ed.) Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48–57. ACM Press, New Delhi (March 1996)CrossRefGoogle Scholar
  9. 9.
    Kim, S., Park, S., Won, D.: Proxy signatures. In: Proc. 1st International Information and Communications Security Conference, pp. 223–232 (1997)Google Scholar
  10. 10.
    Chen, T.-S., Chung, Y.-F., Huang, G.-S.: Efficient proxy multi-signature schemes based on the elliptic curve cryptosystem. Computers & Security 22(6), 527–534 (2003)CrossRefGoogle Scholar
  11. 11.
    Chen, T.-S., Chung, Y.-F., Huang, K.-H.: A traceable proxy multi-signature scheme based on the elliptic curve cryptosystem. Applied Mathematics and Computation 159(1), 137–145 (2004)MathSciNetzbMATHCrossRefGoogle Scholar
  12. 12.
    Yuan, Y.: Improvement of Hsu-Wu-He’s Proxy Multi-signature Schemes. In: Jonker, W., Petković, M. (eds.) SDM 2005. LNCS, vol. 3674, pp. 234–240. Springer, Heidelberg (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Ramanuj Chouksey
    • 1
  • R. Sivashankari
    • 1
  • Piyush Singhai
    • 2
  1. 1.VIT UniversityVelloreIndia
  2. 2.Knowlarity Communications Private LimitedGurgaonIndia

Personalised recommendations