The proxy signature is the elucidation to the entrustment of signing capabilities in any secure electronic milieu. Numerous schemes are prophesied, but they are chattels of information security. In this, I anticipate an enhanced secure threshold proxy signature scheme based on elliptic curve cryptography. I compare the performance of scheme(s) with the performance of a scheme has been anticipated by the writer of this article formerly. I investigate enhanced threshold proxy signature scheme for diverse parameters like entropy, floating frequencies/intuitive synthesis, ASCII histogram, autocorrelation, histogram analysis and vitany. Consequently, the enhanced threshold proxy signature scheme based on elliptic curve cryptography is safe and effective against infamous conspiracy attack(s).
CITATION STYLE
Kumar, R. (2018). Cryptanalysis of protocol for enhanced threshold proxy signature scheme based on elliptic curve cryptography for known signers. In Knowledge Computing and Its Applications: Knowledge Manipulation and Processing Techniques: Volume 1 (pp. 191–211). Springer Singapore. https://doi.org/10.1007/978-981-10-6680-1_10
Mendeley helps you to discover research relevant for your work.