<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf18104</article-id><article-id pub-id-type="doi">10.15388/Informatica.2007.162</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Huang</surname><given-names>Pei-Hui</given-names></name><email xlink:href="mailto:pehui@ismail.csie.ncku.edu.tw">pehui@ismail.csie.ncku.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Wen</surname><given-names>Hsiang-An</given-names></name><email xlink:href="mailto:reinhard@ismail.csie.ncku.edu.tw">reinhard@ismail.csie.ncku.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><contrib contrib-type="Author"><name><surname>Wang</surname><given-names>Chih-Hung</given-names></name><email xlink:href="mailto:wangch@mail.ncyu.edu.tw">wangch@mail.ncyu.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_002"/></contrib><contrib contrib-type="Author"><name><surname>Hwang</surname><given-names>Tzonelih</given-names></name><email xlink:href="mailto:hwangtl@ismail.csie.ncku.edu.tw">hwangtl@ismail.csie.ncku.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><aff id="j_INFORMATICA_aff_000">Department of Computer Science and Information Engineering, National Cheng Kung University Tainan, Taiwan, R.O.C.</aff><aff id="j_INFORMATICA_aff_001">Department of Computer Science and Information Engineering, Leader University Tainan, Taiwan, R.O.C.</aff><aff id="j_INFORMATICA_aff_002">Department of Computer Science and Information Engineering, National Chiayi University Chiayi, Taiwan, R.O.C.</aff></contrib-group><pub-date pub-type="epub"><day>01</day><month>01</month><year>2007</year></pub-date><volume>18</volume><issue>1</issue><fpage>55</fpage><lpage>60</lpage><history><date date-type="received"><day>01</day><month>03</month><year>2005</year></date></history><abstract><p>Recently, Chen, Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve cryptosystem. However, this paper shows that the original signers can produce a valid signature as the proxy signer does in the proxy protected scheme. Therefore, Chen et al.'s proxy-protected scheme cannot protect the proxy signer from being forged by the original signers. We further find that the early work of Chen et al. in 2003 suffers the same attack. To overcome this problem, an improved scheme will be presented.</p></abstract><kwd-group><label>Keywords</label><kwd>proxy signature</kwd><kwd>proxy multisignature</kwd><kwd>proxy-protected</kwd><kwd>elliptic curve</kwd><kwd>digital signature</kwd></kwd-group></article-meta></front></article>