Security Analysis and Implementation of an Improved Cch2 Proxy Multi-Signature Scheme

Raman Kumar
2014 International Journal of Computer Network and Information Security  
Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed; but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multi-signature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity and computational overhead of improved CCH1 and CCH2 proxy multi-signature schemes. We have presented cryptanalysis of improved CCH2 proxy
more » ... ure scheme and showed that improved CCH2 scheme is suffered from various attacks i.e. forgery attack and framing attack.
doi:10.5815/ijcnis.2014.04.06 fatcat:32zvu665xzhqff5pwp3jgigtje