Security Analysis of A Proxy Signature Scheme Based on the Elliptic Curve Cryptosystem