Cryptanalysis of protocol for enhanced threshold proxy signature scheme based on elliptic curve cryptography for known signers

9Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The proxy signature is the elucidation to the entrustment of signing capabilities in any secure electronic milieu. Numerous schemes are prophesied, but they are chattels of information security. In this, I anticipate an enhanced secure threshold proxy signature scheme based on elliptic curve cryptography. I compare the performance of scheme(s) with the performance of a scheme has been anticipated by the writer of this article formerly. I investigate enhanced threshold proxy signature scheme for diverse parameters like entropy, floating frequencies/intuitive synthesis, ASCII histogram, autocorrelation, histogram analysis and vitany. Consequently, the enhanced threshold proxy signature scheme based on elliptic curve cryptography is safe and effective against infamous conspiracy attack(s).

Cite

CITATION STYLE

APA

Kumar, R. (2018). Cryptanalysis of protocol for enhanced threshold proxy signature scheme based on elliptic curve cryptography for known signers. In Knowledge Computing and Its Applications: Knowledge Manipulation and Processing Techniques: Volume 1 (pp. 191–211). Springer Singapore. https://doi.org/10.1007/978-981-10-6680-1_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free