Dissertation > Excellent graduate degree dissertation topics show

Proxy signature research

Author: WangQiuGuo
Tutor: ShiRongHua
School: Central South University
Course: Signal and Information Processing
Keywords: Digital signature Proxy signature Proxy multi-signature Blind Proxy Signature Proxy Signcryption
CLC: TN918
Type: Master's thesis
Year: 2008
Downloads: 97
Quote: 1
Read: Download Dissertation

Abstract


As computer and network communication technology, digital signature technology came into being. Proxy signature is a special signature form, it is by Mambo, Usudu and Okamoto first proposed in 1996. In a proxy signature, the original signer can delegate his signing rights to the proxy signer, so that instead of an agent to sign for him in the exercise. In mobile communications, mobile agents, e-commerce, electronic voting, electronic auctions, etc., proxy signature has an important application. In combination with other digital signature scheme, this paper focuses on some proxy signature schemes were studied. The main contents include: (1) on the wear and others designated receiver proxy signature scheme and Xue et al's use of self-certified public key threshold proxy signature scheme cryptanalysis and found that they are unsafe, can not resist forgery attack. For these two programs defects, its improvements, improved proxy signature scheme satisfies all security requirements. (2) Kang et al combined proxy multi-signature and blind signature feature presents first class blind proxy multi-signature scheme and the second class blind proxy multi-signature scheme, through the analysis found that the first class of blind proxy multi-signature scheme exists messages Owner forgery attack, original signer's forgery attack and proxy signer's internal forgery attacks and other security flaws. In a comprehensive analysis of various forgery attacks, based on the original proposal has been improved, improved scheme to overcome the security risks of the original program, and retains the advantages of the original scheme. (3) based on elliptic curve cryptography, a new multi-proxy multi-signature scheme, and the security of the scheme were analyzed. Scheme, a group of original signers can authorize a group of agents co-signers, authorized proxy signature with all the members of the group can be used instead of the original signature of the signature group members may exercise the right. (4) Based on two-party Schnorr signature scheme, proposed a designated receiver proxy blind signature scheme. Scheme, only the designated recipient can recover the message, verify the legitimacy of the signature by performing interactive zero-knowledge proof, to a third party designated to receive one can prove the validity of signatures. (5) This document defines the proxy multi-signcryption formal model is proposed identity-based proxy multi-signcryption systems, and security of the scheme is analyzed.

Related Dissertations

  1. Subliminal Channel in Multisignature,TN918.1
  2. Study on System of Electronic Documetnt Security Signature,TN918.2
  3. Analysis and improvement of several e-cash payment scheme,TP393.08
  4. Research and Application of digital signature system based on smart cards,TP393.08
  5. Research on the Security in Wireless Sensor Network,TN915.08
  6. Design of a Safety Management System and the Implement of Security Strategy,TP393.08
  7. Forward-secure encryption technology,TN918.2
  8. Study on the Softare of Remote Forest Resources Asset Evaluation and It’s Development,S757
  9. Design and Realization of Security Email System Based on PKI and USBKEY Technology,TP393.098
  10. The Application of Electronic Signatures Technology in the Business of Prosecution,TN918.2
  11. Continued fraction linear lower bound on the number of identity-based signature,TN918.1
  12. Research on Proxy Digital Signature Schemes,TN918.1
  13. Study on Batch Verification of Digital Signatures,TN918.1
  14. Researches on Threshold Proxy Signature Schemes and Multi-level Proxy Signature Schemes,TN918.1
  15. Research of Conic Curve Cryptosystems and the Construction of CC-CSP,TN918.1
  16. Research and Application of Proxy Signature Based on Conic Curves over Z_n,TN918.1
  17. The Research of (t,n) Threshold Proxy Signature Based on Elliptic Curve Cryptosystem,TN918.1
  18. On the Study of Some New Digital Signature Scheme,TN918.1
  19. Study on Proxy Signature Based on Discrete Logarithm Problem,TP309
  20. The Research of Short Signature Based on Bilinear Pairings,TN918.1
  21. Design and Analysis of Designated Verifier Signature,TN918.1

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security
© 2012 www.DissertationTopic.Net  Mobile