Dissertation > Excellent graduate degree dissertation topics show

Analysis and Research of Proxy Signature Protocols

Author: LiXiaoLei
Tutor: JinMingLu
School: Dalian University of Technology
Course: Communication and Information System
Keywords: RSA Cryptosystem Digital Signature Proxy Signature Proxy Multi-Signature Threshold Proxy Signature
CLC: TP393.08
Type: Master's thesis
Year: 2006
Downloads: 135
Quote: 1
Read: Download Dissertation


With the rapid development of computer communication network, people hope to implement rapid and long-distance communication by means of electronic apparatus. As a result, digital signature, which is widely used in society nowadays, comes into being and has been playing a very important role in thefields of information security, identity authentication, data integrity; nonrepudiation and anonymity, etc. As a special digital signature scheme, proxy digital signature is a hot research subject in the field of digital signature schemes recent years. Through transfer the proxy keys, proxy signature allows original signer delegate his/her partial right to the credible proxy signers who can sign the message in behalf of the original signer. Therefore, proxy digital signature can be widely used in many fields, such as e-election, mobile communication, mobile agent, e-commerce activities and so on. Since the year of 1996 when Mambo, Usuda and Okamoto firstly advanced the concept of proxy signature, many proxy signature schemes have been raised, such as proxy mufti-signature scheme, threshold proxy signature scheme and proxy blind digital signature scheme, and also plenty of achievements have been made in the studies of proxy digital signature. However, most of the existing proxy signature schemes have some defects in security, efficiency and feasibility. At the same time, mostly these schemes are based on the discrete logarithm cryptosystems, while the RSA cryptosystem is now the de facto industrial standard and based on factorization; therefore, it is highly desirable to design secure, efficient and feasible proxy signature schemes based on the RSA cryptosystem. This paper made some meaningful attempts in the fields mentioned above.The main contributions of this paper:(1) The paper analyzes a RSA-based proxy signature scheme, and shows its low ability in resistance to forgery attack, and also proposes a new improved signature scheme.(2) The paper proposes two RSA-based proxy multi-signature schemes for each type of the first and second proxy multi-signature. Through analysis and comparison of the presented schemes and proxy multi-signature based on discrete logarithms, the simulation results demonstrate that the former is better than the latter both in security and efficiency performance.(3) The paper analyzes a RSA-based (t, n) threshold proxy signature scheme, and proposes a new improved scheme. Simulation results show that, as the computational and communicational overheads is not greatly raised, the improved scheme is better than the original scheme in security and feasibility.

Related Dissertations

  1. Study on System of Electronic Documetnt Security Signature,TN918.2
  2. The Design and Implementation of Student Information Management System Based on Workflow,TP311.52
  3. Design and Implementation of Electronic Seal System Based on Improved Algorithm of MD5,TN918.1
  4. Study on Proxy Signature Based on Discrete Logarithm Problem,TP309
  5. A Research on Key Technology of Computer Dynamic Forensics,D918.2
  6. The Research and Design about the Course Selection and Score Management System on Digital Signature,TP311.52
  7. Data Encryption Technology and Its Application in Transmission in Network,TP393.08
  8. Research on ID-based Proxy Blind Signature Scheme,TP309.7
  9. Research on Forward Security and Strong Blindness,TP393.08
  10. Release management support PKI-based security and digital media,TP393.08
  11. The Design and Realization of Digital Signature Algorithm for Security Middle Ware,TP309
  12. Research on Complex Digital Signature Schemes and Security Authentication,TN918.1
  13. Ergodic Matrices and Its Applications in Public Key Cryptography,TN918
  14. Research and Design of Secure Protocols and Schemes,TP393.08
  15. Design and Research of Group Digital Signature Schemes,TP309
  16. Study and Design of Several Proxy Cryptographic Schemes,TN918.1
  17. Research on Authentication Architecture and Related Technologies of Information System,TP309
  18. Study on Theory and Application of Multi-Secret Sharing,TN918
  19. Research on Application Model and Implementation of Proxy Signature in Distance Education,TN918.1
  20. Research on Identification Technology for Authenticity of Digital Images,TP391.41
  21. Study on Theory and Application of Multi-Party Digital Signature,TN918.1

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile