Dissertation > Excellent graduate degree dissertation topics show

Proxy signature and its forward security

Author: WangLiang
Tutor: JiaXiaoZhu
School: Qingdao University
Course: Applied Computer Technology
Keywords: information security digital signature proxy signature forward-security
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 65
Quote: 0
Read: Download Dissertation


Digital signature technology is of great importance in the network information security techniques and plays an important role in electronic commerce.Proxy signature provides methods to right commission in the electronic information society.Because of its spreading applied vista in electronic cash,electronic stocks,mobile agent and substitute product of electronic commerce,proxy signature was given extensive attention after proposed.Proxy signature,same as digital signature,its security depends on two aspects: anti-attack ability of proxy signature scheme and safety of the signature key.According to the Kerckhoff hypothesis,cryptosystem is always open,so the security of proxy signature is determined by the security of signature secret key.Once the secret key exposes,the whole signature scheme will be not safe any longer,so how to decrease the harm brought by the key becomes a concerned problem.A new idea of solving key exposures is forward secure idea.The aim of forward secure is to reduce the loss brought by key exposures.On the basis of proxy signature and forward-security,the forward-secure proxy signature was studied in this paper,our achievements are as follows:First,the idea of forward secure and proxy signature scheme were combined together. By adding key evolution process in proxy signature scheme,we gave the forward-security to the proxy signature key,provided forward-secure proxy signature based on discrete logarithm and forward-secure proxy signature based on elliptic curve key scheme.Second,forward-secure proxy signature can guarantee the key’s safety before key exposures,while it can’t prevent subsequent signature by the attacker.Based on this,we put the research on strong forward-secure proxy signature.Two strong forward-secure proxy signature schemes were given:self-updating strong forward-secure proxy signature based on trapdoor information and interactive strong forward-secure proxy signature.

Related Dissertations

  1. Subliminal Channel in Multisignature,TN918.1
  2. Study on System of Electronic Documetnt Security Signature,TN918.2
  3. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  4. The Design and Implementation of Student Information Management System Based on Workflow,TP311.52
  5. Study on Strategy of Our National Confidential E-government Nets’ Information Security Construction,D630
  6. Research and Design on Asymmetric Encryption and Decryption Algorithm Based on FFTT,TP309.7
  7. Study on Information Security of C Company,F270.7
  8. Study on Information Management Security and Countermeasures of A Power Supply Company,F426.61
  9. Research and Application on Security Authentication Technologies in Internet of Things,TN929.5
  10. Digital Information Resources System Security Risk Assessment,G353.1
  11. Analysis and improvement of several e-cash payment scheme,TP393.08
  12. Research and Application of digital signature system based on smart cards,TP393.08
  13. Design and Implementation of the online bidding system for information security,TP393.08
  14. Intrusion Detection in Mobile Ad Hoc Networks: A Timed Finite State Machines Approach,TN929.5
  15. Research and Implementation of Information Security Strategy in Electric Enterprises,TP393.08
  16. Reliability and Security Study of the Digital Substation System,TM732
  17. Research on the Security in Wireless Sensor Network,TN915.08
  18. Memory Integrality Verify Oriented Cache Design,TP332
  19. Optical Image Encryption Algorithms Based on Fractional Mellin Transform,TP309.7
  20. Research of the Rational Secret Sharing Technology,TN918.1
  21. Mobile terminal identity digital signature scheme based on research,TN918.1

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile