Dissertation > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory

Research on Some Types of Proxy Signature with Additional Properties

Author CuiShenJun
Tutor WenFengTong
School Jinan University
Course Applied Mathematics
Keywords Proxy signature Forward Security Repeatedly authorized Identity - based signature Proxy Blind Signature
CLC TN918.1
Type Master's thesis
Year 2011
Downloads 18
Quotes 0
Download Dissertation

In recent years, with the development of information networks, the agent signature has been widely used in business, government, military and other fields, as one of the core technology of the digital signature proxy signature, in the theoretical study and practical life has a very important role. Especially with the special nature of the proxy signature by the widespread concern. In this thesis, the categories with the special nature of the proxy signature, and designed a series of programs, and their performance analysis of the system. The main contents are as follows: (1) an efficient strong forward secure proxy signature scheme, the programs take full advantage of the hash function for fast key update, and only after every signature update, thus reducing updated a number of times, saving the cost of computing. The same time, the increase in the key parameters, and proxy private key co-produced by the original signer and the proxy signer, so that even if the proxy signer's key leaked programs still meet strong forward security. Based on a secure hash function and discrete logarithm of hard problems, forking lemma proved their strong forward security. (2) proposed a efficient repeatedly authorized to the same proxy signer signature scheme, The timestamp the program time to confirm the proxy authorization, thereby limiting the time the use of the power of attorney, the original signer can collection agency relicensing reduced complexity, and does not require a trusted third party participation. (3) an identity-based multi-level anonymous proxy signature scheme, the program can be progressively commissioned signature rights, and the use of anonymous proxy progressively authorized to protect the identity of the proxy signer, so that verification can not from the final signature to determine the identity of the signer. In addition, the introduction of a trusted third party, if the object signature by a trusted third party to reveal the identity of the signer. The digital signature scheme, identity-based public key certificate is not required, saving system resources and improve the computational efficiency. (4) an identity-based designated verifier proxy multi-signature scheme, the program designated verifier's private key is used in the verification process, so in addition to the specified verifier anyone other proxy multi-signature can not be verified correctly sex. In the verification process, the program without using the signer's public key information, just all of the original signer aggregate signature, and thereby improve the verification efficiency. (5) proposed a proxy signature scheme leaked by an identity-based anti-agent private key, the program use the bilinear pairings nature, combined with password authentication and blind signature technology, you can not through the secure channel to transfer the user's private key, only those with passwords The user can decrypt the correct private key and security model ps-uf-pke prove its security in the random model. (6) proposed proxy blind signature scheme based on bilinear pairing in the standard model, the program combined with the nature of blind signature and proxy signature, meet the blind and links, is a strong proxy blind signature scheme.

Related Dissertations
More Dissertations