Dissertation
Dissertation > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Communications security technology

Research and design on proxy signature scheme

Author YangLi
Tutor ZhangJianZhong
School Shaanxi Normal University
Course Applied Mathematics
Keywords digital signature proxy signature public key replacement attack malicious-but-passive KGC attack certificateless public key cryptography
CLC TN918.91
Type Master's thesis
Year 2013
Downloads 37
Quotes 0
Download Dissertation

With the advent of the information age of the21st century, information has become a special resources and wealth which attracted great attention. At the same time, information security issues become particularly important. Because the information once be intercepted, stolen, tampered or destruction by the unauthorized signer, it will cause irreparable huge loss. Cryptography theory has made a lot of research on these issues which achieved many important results.Digital signature is an important branch of cryptography, which plays a significant role in ensuring information security. According to the feature of signature and the different application environment, digital signatures have many classifications. Such as proxy signature, blind signature, ring signature and group signature. This paper mainly introduces the proxy signature, which agent instead the primitive people to exercise the signature rights. The main contents are as follows:1. We first introduce the related research and development of digital signature and proxy signature.2. This thesis made analysis to a new proxy signature, points out that it cannot resist the public key replacement attack. We propose an improvement scheme on the basis of the original one.3. It analysis a certificateless proxy blind signature scheme which proposes by HuangJuan et al. And points out that there are security flaws. This thesis proposes a new certificateless proxy blind signature scheme which can resist the public key replacement attack and malicious-but-passive KGC attack. So the new scheme is more security.4. We analysis an efficient certificateless signature scheme which proposes by DuHongzhen et al, find out this scheme cannot resist malicious KGC attack. Then we design a new scheme which is more security.

Related Dissertations
More Dissertations