Dissertation > Excellent graduate degree dissertation topics show

Research and design on proxy signature scheme

Author: YangLi
Tutor: ZhangJianZhong
School: Shaanxi Normal University
Course: Applied Mathematics
Keywords: digital signature proxy signature public key replacement attack malicious-but-passive KGC attack certificateless public key cryptography
CLC: TN918.91
Type: Master's thesis
Year: 2013
Downloads: 37
Quote: 0
Read: Download Dissertation


With the advent of the information age of the21st century, information has become a special resources and wealth which attracted great attention. At the same time, information security issues become particularly important. Because the information once be intercepted, stolen, tampered or destruction by the unauthorized signer, it will cause irreparable huge loss. Cryptography theory has made a lot of research on these issues which achieved many important results.Digital signature is an important branch of cryptography, which plays a significant role in ensuring information security. According to the feature of signature and the different application environment, digital signatures have many classifications. Such as proxy signature, blind signature, ring signature and group signature. This paper mainly introduces the proxy signature, which agent instead the primitive people to exercise the signature rights. The main contents are as follows:1. We first introduce the related research and development of digital signature and proxy signature.2. This thesis made analysis to a new proxy signature, points out that it cannot resist the public key replacement attack. We propose an improvement scheme on the basis of the original one.3. It analysis a certificateless proxy blind signature scheme which proposes by HuangJuan et al. And points out that there are security flaws. This thesis proposes a new certificateless proxy blind signature scheme which can resist the public key replacement attack and malicious-but-passive KGC attack. So the new scheme is more security.4. We analysis an efficient certificateless signature scheme which proposes by DuHongzhen et al, find out this scheme cannot resist malicious KGC attack. Then we design a new scheme which is more security.

Related Dissertations

  1. Subliminal Channel in Multisignature,TN918.1
  2. Study on System of Electronic Documetnt Security Signature,TN918.2
  3. The Design and Implementation of Student Information Management System Based on Workflow,TP311.52
  4. Researches on Digital Signature Scheme Based on Bilinear Map,TN918.1
  5. Research on Blind Signature and Ring Signature,TN918.1
  6. Researches and Application on PKI and Digital Watermarking in the Electronic Seal System,TP309.7
  7. Based on TCP/IP Application Layer Design and Implementation of Security Protocol,TP393.08
  8. Research on the Security in Wireless Sensor Network,TN915.08
  9. Continued fraction linear lower bound on the number of identity-based signature,TN918.1
  10. Secret Sharing and Application of Secret Sharing in Proxy Signature,TN918.1
  11. The Research and Application Based on Elliptic Curve Cryptosystems,TN918.1
  12. The Research of (t,n) Threshold Proxy Signature Based on Elliptic Curve Cryptosystem,TN918.1
  13. Combined with dual chaotic systems with digital signature authentication algorithm,TP309.7
  14. Standard model safe threshold cryptosystem without certificate,TN918.1
  15. Design and Analysis of Designated Verifier Signature,TN918.1
  16. PKI-based security model of product design documentation and implementation,TP393.08
  17. Research and Realization of the Secure E-Mail System Based on PKI,TP393.098
  18. Research and Implementation of Scalar Multiplication Algorithms and Mixed Encryption on Conic Curve over F2m,TN918.1
  19. Application of MPKCs on Construction of Signature Algorithm and Hash Function,TN918.1
  20. Design and Implementation of NAS Security System Based on SSL Protocol,TP393.08
  21. The Study of Digital Signature Technique and Its Application Based on PKI,TN918.2

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Communications security technology
© 2012 www.DissertationTopic.Net  Mobile