Dissertation > Excellent graduate degree dissertation topics show
Research on the Digital Signature Based on ECC and Bilinear Pairings
Author: WangHongTao
Tutor: LiDaXing
School: Shandong University
Course: Applied Mathematics
Keywords: digital signature scheme bilinear parings proxy signature scheme multi-signature scheme threshold signature scheme
CLC: TN918.1
Type: PhD thesis
Year: 2006
Downloads: 167
Quote: 0
Read: Download Dissertation
Abstract
As present many digital signature schemes have the following disadvantages: low efficience and security, this paper brings forward eleven more efficienct and secure digital signature schemes based on ECC and bilinear parings. Furthermore, according to every new scheme, we give the corresponding correctness proof, security analysis and the advantage.Since the Diffie and Hellman put forward the digital signature conception in 1976, digital signature caused the extensive value of the academic circles and the calculator network field. The ISO signed an item for this exclusively in September of 1984. The WG2 of the appointed SC20 inferiorities’ was responsible for establishment these standards. That expresses the emphasis of ISO on digital signature. The SC20 formally divided digital signature into three types: taking the digital signature of an official seal, taking the digital signature of the shadow and using digital signature of the Hash function. In 1985, ElGamal designed a kind of digital signature that can used in the digital signature and that encryption can used for a signature again. In 1991, the NIST put forward the digital signature standard(DSS) and digital signature algorithm(DSA). At the same time, various digital signature schemes also are put forward continuously with application. The digital signature schemes that are famous contain RSA, Rabin, EIGamal, Schnorr, DSS, Diffie-Hellman etc. In the last few years, along with digital signature study thoroughly, many special of digital signature were produced, such as proxy signature, blind signature, multi-signature, threshold signature and group signature etc. A lot of more special signatures were produced again by these signatures, such as proxy multi-signature, multi-proxy signature and multi-proxy multi-signature etc. Because these special digital signature have good properties: making to orderany in the management, important military of the electronic commerce, public resources thus of countersign, election by ballot, the financial contract sign etc. This is a very worthy of value and have biggest applied value of research realm. This is also author why want to choose these special digital
|
Related Dissertations
- Research of Ad Hoc Network Authentication System Model Based on PKI,TP393.08
- Study on the Threshold Digital Signature Scheme,TN918.1
- The Application of the Digital Signature Techniques in the Electronic Taxes System,TP393.09
- Costas arrays exist , counting problems in cryptography,TN918.1
- Several Problems in Computational Number Theory,O156
- The Conic Curves over Z_n and Its Applications in Public-Key Cryptosystem,TN918
- Based on elliptic curves and bilinear on the digital signature,TN918.1
- Research on Security of Mobile Payment,TP393.08
- Research on Society-Oriented Digital Signature Scheme,TN918.1
- The Research on Digital Signature Scheme and Its Digital Sequential Multisignature Scheme,TN918.2
- The AES Algorithm and Its Implementation in DSP,TN918.1
- Resrarch on Multisignatures and Multisigncryptions from Identity-based,TN918.1
- Subliminal Channel in Multisignature,TN918.1
- Study on System of Electronic Documetnt Security Signature,TN918.2
- DR Stinson \,TN918.1
- Secret sharing scheme,TN918.1
- Group Key Management in Wireless Sensor Networks,TN918.82
- Research and Design of a High-Performance Scalable Public Key Cryptographic Coprocessor,TN918.1
- Research and Implementation on Encrption of UMTS System,TN918.4
- Study of several secret sharing scheme,TN918.1
- Research on Novel Steganography Algorithm with High Capacity,TN918
CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net Mobile
|